2nd International Conference on Networks and Cryptology (NetCrypt)

4-6 December, 2020
Jawaharlal Nehru University, New Delhi

2nd International Conference on Networks and Cryptology (NetCrypt)

4-6 December, 2020
Jawaharlal Nehru University, New Delhi

2nd International Conference on Networks and Cryptology (NetCrypt)

4-6 December, 2020
Jawaharlal Nehru University, New Delhi

2nd International Conference on Networks and Cryptology (NetCrypt)

4-6 December, 2020
Jawaharlal Nehru University, New Delhi

Slider

Program

NETCRYPT2020 -  PROGRAMME SCHEDULE

      -------Update soon----

Accepteed Papers for NetCrypt 2020

PID

Authors, Title

Status

Remarks

1

Peeyush Kumar, Ayushe Gangal, Sunita Kumari, Aditya Kumar and Archana Balyan. GENigma(MayhemNet): Canalizing Stochasticity of Neural Nets into an Insurmountable Encryption Machine

Accepted

  A

2

Atul Chaturvedi, Varun Shukla and Manoj Kumar Misra. A Random Encoding Method for Secure Data Communication: An Extension of Sequential Coding

Accepted

   A

3

Varun Shukla, Manoj Kumar Misra and Atul Chaturvedi. A NEW AUTHENTICATION PROCEDURE FOR CLIENT-SERVER APPLICATIONS USING HMAC

Accepted

   A

4

Ashok Kumar and Rajveer S Yaduvnahshi. Nano Cylindrical Dielectric Resonator Antenna for Biomedical Application

Accepted

C

5

Ram Krishna and Rajveer Singh Yaduvanshi. Optical DRA and its Equivalent Circuit Analysis

Accepted

 C

6

Sandeep Kaur and Dr. Bharat Bhushan Sagar. Web Scraping System for Image Dataset Creation of Ancient Brahmi Script using SIFT Feature: BIDS(Brahmi Image Dataset System)

Accepted

B

7

Siddhardha Kollabathini. Dispute between Countries, a Corresponding Attack on Cyber Space: The New National Security Challenge

Accepted

C

8

Satvik Vats, Abhishek Rai and Bharat Bhushan Sagar. K-Means clustering over distributed environment: A Review

Accepted

B

9

Satvik Vats, Sunny Singh and Bharat Bhushan Sagar. Apriori based Algorithms having Decentralized Approach for mining frequent item-sets: A Review

Accepted

C

10

Shiv Hari Tewari. Abuses of blockchain and Cryptocurrency in dark web and how to regulate them

Accepted

C

11

Rajveer S Yaduvanshi, Alok K Kushwah and Nishtha Saroha. Terahertz rectangular DRA for high speed communication applications

Accepted

A

12

Sanoj Kumar, Manoj Singh and Deepika Saini. An image watermarking framework based on PSO and FrQWT

Accepted

A

13

Vikas Kumar, B B Sagar and Manisha Munjul. Security Issues in Wireless Sensor Network – A Survey

Accepted

C

14

Farhad Khoshbakht and S.M.K. Quadri. A Comparative Performance Evaluation of Search Items and Experience Items in Amazon Costumer Reviews

Accepted

C

15

Farhad Khoshbakht and S.M.K. Quadri. Role of the Big Data Analytic framework in Business Intelligence and its Impact: Need and Benefits

Accepted

C

16

Narender Pavan, Dr. Sushil Kumar and Gajendra Nayak. Spectrum Sharing in Cognitive Radio Networks

Accepted

A

17

Bhanu Chander. Secure Authentication in IoT and Cloud Server:An ECC based practice

Accepted

A

18

Anmol Gupta, Gayatri Sakya and Suyash Verma. Internet of Things care device for Visually Impaired and old people

Accepted

A

19

Raj Chauhan and Rajendra Kumar. Analysis of Severity of COVID-19 using Artificial Intelligence Technique

Accepted

C

20

Himani Tyagi and Rajendra Kumar. Analyzing security approaches for threats, Vulnerabilities, and attacks in an IoT environment

Accepted

C

21

Sarika Sharma and Deepak Kumar. Exploring Story Cards for Evaluating Requirement Understanding In Agile Software Development

Accepted

C

22

Anand Kumar AND Karan Singh. Efficient Trust Assessment Mechanism for E-healthcare System

Accepted

C

23

Anshita Dhoot, Karan Singh Sonam Devgan Kaul and Anand Kumar. Enhanced Lightweight and Secure Session Key Establishment Protocol for Smart Home Inhabitants

Accepted

A

24

Suraj Khattri and Kirshna Kumar. Performance Analysis of NoSQL and Relational Database with Transactional Data

Accepted

C

25

Rinki Rani and Sushil Kumar. Fog-enabled Secure Data Deduplication and Encrypted Search for Internet of Things

Accepted

A

26

Lal Pratap Verma and Indradeep Verma. A Review on Transport Layer Multipath Communication

Accepted

C

27

Vinod Kumar, Neelendra Badal and Rajesh Mishra. Cryptographic Encryption and Decryption Technique for Securing Medical Images

Accepted

B

28

Mukesh Kumar and Dr. Sushil Kumar. Data Mining for Internet of Things

Accepted

A

29

Mukesh Kumar and Dr. Sushil Kumar. Q-Learning Based Algorithm for Energy Balanced Routing in Internet of Things

Accepted

C

30

Manoj Kumar and Sushil Kumar. ML Based Strategy For Optimal Power Prediction in IOT

Accepted

B

31

Gopal Rawat and Karan Singh. Security Schemes based on Conditional-Privacy Preserving in VANETs: A Review

Accepted

B

32

Indu Dohare and Karan Singh. Lightweight Trust Evaluation in IoT: Bio Inspired Metaheuristic Approach

Accepted

A

33

Ajay Gupta, Devendra Singh, and Lal Verma. A Novel Approach for Congestion Control In IoT Environment

Accepted

A

34

Ajay Gupta, Devendra Singh and Lal Verma. An Adaptive Congestion Control Algorithm

Accepted

A

35

Chakradhar Verma and C.P. Gupta. Epidemiological Model for Stability Analysis of Wireless Sensor Network under Malware Attack

Accepted

A

36

Ashish Bajpai, and Dr. B.K. Sharma. Analysis of congestion avoidance algorithms in software defined network: A review

Accepted

C

37

Ashok Kumar Yadav and Karan Singh. Significance of Elliptic Curve Cryptography in Blockchain IoT

Accepted

A

38

Tayyab Khan and Karan Singh. A Realiable Trust Model For Industrial Wireless Sensor Networks

Accepted

A

39

Anand Kumar. Wireless Health Care System: An Overview

Accepted

C

40

Intyaz Alam, Sushil Kumar and Manoj Kumar. An Efficient Lightweight Location Privacy Scheme for VANET

Accepted

C

41

Sneha Mishra and Dileep Kumar Yadav. Moving Object Detection in Video Captured by Static Camera: A Survey

Accepted

C

42

Manoj Kumar, Susmita Ray and Dileep Kumar Yadav. Role of AI/ML for Vehicle Detection and Tracking in Highways and Transportation System

Accepted

C

43

Mohd Shariq and Karan Singh. Image Encryption using 2D Logistic Map

Accepted

C

44

Mohd Shariq and Karan Singh. Probabilistic Image Encryption based Secure Surveillance Framework for IoT Environment

Accepted

C

45

Vimal Kumar and Devendra Singh. A Review on Network and Transport Layer Multipath Communication Protocols

Accepted

C

46

Sunil Kumar and Subodh Kumar. An image encryption model using IBC

Accepted

A

47

Sunil Kumar and Lakshay Sharma. Notified! – A Progressive Web App

Accepted

D

48

Sunil Kumar and Karan Singh. A Comparative Analysis of Routing and Localization Protocols in Internet of Vehicles

Accepted

C

49

Rajaraman Ramachandran, P K Kapur, Deepak Kumar and Velmurugan K. Measuring Perceived Quality of Software Ecosystem based on transactions in Customer Management Tools

Accepted

C

50

Vinay Pathak, Achintya Kumar Pandey and Rajat Kishor Varshney. Secure and Early Detection Framework for Covid-19: Standardization of Clinical Process

Accepted

C

51

Musaeed Abouaroek and Khaleel Ahmad. Performance Analysis of NTRU Algorithm with Non Post-Quantum Cryptography Algorithms

Accepted

A

52

Amina Khan, Sumeet Gupta and Sachin Kumar Gupta. UAV-Enabled Disaster Management: Applications, Open Issues, and Challenges

Accepted

C

54

Sapna Sharma and Dr Shilpy Agrawal. Personal authentication based on vascular pattern using finger vein biometric

Accepted

C

55

Sudhakar Kumar, Prof. Dr. Sunil K. Singh and Prof. Dr. Naveen Aggarwal. The Concept of Speculative Parallelism on Multicore Chip Architecture strengthens the Concept of Green Computing- A Survey

Accepted

C

56

Samarth Shakya and Vivek Kapoor. A Decentralized Polling System Using Ethereum Technology

Accepted

A

57

Rati Gupta and Vivek Kapoor. Hybrid Symmetric Cryptography Approach for Secure Communication in Web Application

Accepted

A

58

Monika Jangra and Buddha Singh. Mod-k-Chained Variant of PRESENT and CLEFIA Lightweight Block Cipher for an Improved Security in Internet of Things

Accepted

A

59

Anand Kumar. Wireless Health Care System: An Overview

Accepted

C

60

Ashu Gautam, Rashima Mahajan and Sherin Zafar,  Energy consumption analysis of IoT-MANET based systems with ANOVA assessment for tackling COVID-19 Accepted A

61

Rajit Ram Yadava. A Wireless Sensor Network Clustering Protocol for Heterogeneous Energy Network Environments Accepted C

 

  • A-Paper is good in quality and may recommend for journal after registration and presentation. Need to improve according to comment of session chairs and PC members.
  • B-Paper is good but needs to improve in structure, algorithm, results, and references. May recommend to journal after registration, and presentation. In addition, incorporate the session chair and PC member's comments.
  • C-Paper is average in quality and best suitable for conference proceedings. PC members may select few papers for journal after registration, presentation, and improvement according to suggestions of session chairs and PC members.
  • D- Paper is very poor in quality suitable for poster presentation only. Need improvements in structure, such as Introduction, Background, and Related Work, Proposed Work, Result and Discussion, and Conclusion.
  • Rest submitted papers are rejected due to quality and out of scope.

 

General suggestions for paper category B, C, and D

  1. Write one paragraph for your contribution and one paragraph for motivation
  2.  Provide more simulation results with good analysis.
  3.  Improve the related work section and add the latest references
  4.  Authors are advised to give proper reference wherever it requires.
  5.  Results need to be explained so it will be better for readers
  6.  Remove grammatical and article errors
  7.  Need to add future direction

NOTE: As per conference policy need the final camera-ready copy(CRC) with less than 10% similarity index. Kindly do accordingly, otherwise, the paper may be finally rejected after the presentation if CRC  having more than 10% similarity index.