Dr. Ajay Sharma
My Social Links

Dr. Ajay Sharma

Professor
Sri Ramaswamy Memorial University, India


Highest Degree
Ph.D. in Computer Science and Engineering from Sri Ramaswamy Memorial University, Chennai, India

Share this Profile

Biography

I am currently working as a Professor in the Department of Computer Science and Engineering, SRM University, Delhi-Ncr, Sonepat, Haryana,. I had joined this organization in October 2012 as a founding faculty and had foreseen lots of government visits like the department of higher education of Haryana and UGC Visit as a Head of the Department.

Area of Interest:

Computer Sciences
100%
Cryptography
62%
Template Security
90%
Information Security
75%
Computer Programming
55%

Research Publications in Numbers

Books
1
Chapters
0
Articles
30
Abstracts
1

Selected Publications

  1. Chauhan, S. and A. Sharma, 2022. Improved fuzzy commitment scheme. Int. J. Inf. Tecnol., 14: 1321-1331.
    CrossRef  |  Direct Link  |  
  2. Agarwal, P., A. Sharma and N. Kumar, 2022. A soft-computing approach to fuzzy EOQ model for deteriorating items with partial backlogging. Fuzzy Inf. Eng., 14: 1-15.
    CrossRef  |  Direct Link  |  
  3. Chauhan, S. and A. Sharma, 2019. A generalized approach for the fuzzy commitment scheme. J. Cyber Secur. Technol., 3: 189-204.
    CrossRef  |  Direct Link  |  
  4. Chauhan, S. and A. Sharma, 2016. Fuzzy commitment scheme based on reed solomon codes. SIN '16: Proceedings of the 9th International Conference on Security of Information and Networks, July 2016, ACM, pp: 96-99.
    CrossRef  |  Direct Link  |  
  5. Sharma, A. and D.B. Ojha, 2013. Password hardened biometric: a complete solution of online security. Int. J. Comput. Network Inf. Secur., 6: 42-48.
    CrossRef  |  Direct Link  |  
  6. Sharma, A., A. Dwivedi and D.B. Ojha, 2011. Secure transmission of imperative picturesque content with key agreement protocol. Int. J. Comput. Inform. Syst., 2: 32-36.
    Direct Link  |  
  7. Ojha, D.B., A.Sharma, B. Kumar, A. Dwivedi and A. Kumar, 2011. Secure and authenticated visual content transmission with codebase cryptosystem. Int. J. Adv. Res. Comput. Sci., 2: 643-645.
    Direct Link  |  
  8. Ojha, D.B., A. Sharma, R. Singh, A. Shukla and M. Sahni, 2011. Cryptic E-mailing Scheme Over Stymieing Channel. Int. J. Adv. Eng. Sci. Technol., 3: 155 -158.
    Direct Link  |  
  9. Ojha, D.B., A. Sharma, A. Dwivedi, N. Pandey and A. Kumar, 2011. An authenticated transmission of medical image with codebase cryptosystem over noisy channel. Int. J. Adv. Network. Appl., 2: 841-845.
    Direct Link  |  
  10. Ojha, D.B., A. Sharma, A. Dwivedi, N. Pandey and A. Kumar, 2011. An approach for secure transmission of large medical data using post quantum cryptosystem. Adv. Comput. Sci. Technol., 4: 73-81.
    Direct Link  |  
  11. Dwivedi, A., D.B. Ojha, A. Sharma and A. Mishra, 2011. A key-agreement protocol using polynomials root problem over non-commutative division semirings. Int. J. Comput. Inform. Syst., 2: 60-63.
    Direct Link  |  
  12. Ajay, S., 2011. Biometric template security using code base cryptosystem. Information and Security. Int. J. Spec. Cyber Secur. Challenges Responses, (In Press). .
  13. Ajay, S., 2011. A Multi-biometric template security: an application of code base cryptosystem. Int. J. Comput. Sci. Eng. Sys., (In Press). .
  14. Ajay, S., 2011. Transmission of large information through kap using non-abelian group. J. Global Res. Comput. Sci., 2: 120-125.
    Direct Link  |  
  15. Sharma, A., N. Pandey, A. Dwivedi, A. Kumar and D.B. Ojha, 2010. An approach for two-tier security on transmission of medical image using post quantum cryptosystem over teeming channel. Int. J. Adv. Eng. Sci. Technol., 1: 10-15.
  16. Sharma, A. and D.B. Ojha, 2010. Secure and unique biometric template using post quantum cryptosystem. Int. J. Comput. Intell. Inform. Secur., 1: 53-61.
  17. Sharma, A. and D.B. Ojha, 2010. Application of coding theory in fuzzy commitment scheme. Middle-East J. Scientific Res., 5: 445-448.
    Direct Link  |  
  18. Ojha, D.B., R. Singh, A. Sharma, A. Mishra and S. garg, 2010. An innovative approach to enhance the security of data encryption scheme. Int. J. Comput. Theor. Eng., 2: 380-383.
    Direct Link  |  
  19. Ojha, D.B., J.P.Pandey, A. Sharma and A. Dwivedi, 2010. A Non-repudiable biased bitstring commitment scheme on a post quantum cryptosystem. J. Appl. Theor. Inf. Technol., 12: 40-44.
    Direct Link  |  
  20. Ojha, D.B., A. Sharma, R. Singh, S. Garg and A. Mishra et al., 2010. An analysis of fraudulence in fuzzy commitment scheme with trusted party. Int. J. Comput. Sci. Secur., 3: 578-582.
    Direct Link  |  
  21. Ojha, D.B., A. Sharma, R. Singh and S. Garg, 2010. An extensive security analysis of fuzzy commitment scheme. Int. J. Comput. Internet Secur., 2: 21-27.
    Direct Link  |  
  22. Ojha, D.B., A. Sharma, A. Dwivedi, N. Pandey and A. Kumar, 2010. Space-age approach to transmit medical image with codebase cryptosystem over noisy channel. Int. J. Eng. Sci. Technol., 2: 7112-7117.
    Direct Link  |  
  23. Ojha, D.B., A. Sharma, A. Dwivedi, B. Kumar and A. Kumar, 2010. An authenticated two-tier security on transmission of medical image using codebase cryptosystem over teeming channel. Int. J. Comput. Appl., 12: 22-26.
    Direct Link  |  
  24. Ojha, D.B., A. Dwivedi, A. Sharma and R. Singh, 2010. A non-repudiable biased bitstring key agreement protocol (NBBKAP) using conjugacy problem in non-Abelian group. Int. J. Eng. Sci. Technol., 2: 4162-4166.
    Direct Link  |  
  25. Ojha, D.B. and A. Sharma, 2010. Transmission of picturesque content with code base cryptosystem. Int. J. Comput. Technol. Appl., 2: 127-131.
    Direct Link  |  
  26. Ojha, D.B. and A. Sharma, 2010. A fuzzy commitment scheme with mceliece cipher. Surv. Math. App., 5: 73-83.
    Direct Link  |  
  27. Ajay, S., D.B. Ojha, R. Singh and A. Shukla, 2010. A model of anonymous cum idiosyncratic machiavellian mailing system using steganographic scheme. Int. J. Comput. App., 8: 1-4.
    CrossRef  |  Direct Link  |  
  28. Ajay, S., D. B. Ojha, A. Dwivedi, B. Kumar and A. Kumar, 2010. Secure and error free transmission of audio/visual content. J. Global Res. Comput. Sci., 1: 12-15.
  29. Ajay, S., 2010. A fuzzy commitment scheme: An approach using ORDES. J. Eng. Sci. Technol., (In Press). .
  30. Roy, A., S. Pal and M.K. Maiti, 2009. A production inventory model with stock dependent demand incorporating learning and inflationary effect in a random planning horizon: A fuzzy genetic algorithm with varying population size approach. Comput. Ind. Eng., 57: 1324-1335.
    CrossRef  |  Direct Link  |  
  31. Pandey, J.P., D.B. Ojha and A. Sharma, 2009. Enhance fuzzy commitment scheme: An approach for post quantum cryptosystem. J. Applied Theoretical Inf. Technol., 9: 16-19.
    Direct Link  |