Dr. Ajay Sharma

Professor
Sri Ramaswamy Memorial University, India


Highest Degree
Ph.D. in Computer Science and Engineering from Sri Ramaswamy Memorial University, Chennai, India

Share this Profile

Biography

I am currently working as a Professor in the Department of Computer Science and Engineering, SRM University, Delhi-Ncr, Sonepat, Haryana,. I had joined this organization in October 2012 as a founding faculty and had foreseen lots of government visits like the department of higher education of Haryana and UGC Visit as a Head of the Department.

Area of Interest:

Computer Sciences
Cryptography
Template Security
Information Security
Computer Programming

Selected Publications

  1. Chauhan, S. and A. Sharma, 2022. Improved fuzzy commitment scheme. Int. J. Inf. Tecnol., 14: 1321-1331.
    CrossRef  |  Direct Link  |  

  2. Agarwal, P., A. Sharma and N. Kumar, 2022. A soft-computing approach to fuzzy EOQ model for deteriorating items with partial backlogging. Fuzzy Inf. Eng., 14: 1-15.
    CrossRef  |  Direct Link  |  

  3. Chauhan, S. and A. Sharma, 2019. A generalized approach for the fuzzy commitment scheme. J. Cyber Secur. Technol., 3: 189-204.
    CrossRef  |  Direct Link  |  

  4. Chauhan, S. and A. Sharma, 2016. Fuzzy commitment scheme based on reed solomon codes. SIN '16: Proceedings of the 9th International Conference on Security of Information and Networks, July 2016, ACM, pp: 96-99.
    CrossRef  |  Direct Link  |  

  5. Sharma, A. and D.B. Ojha, 2013. Password hardened biometric: a complete solution of online security. Int. J. Comput. Network Inf. Secur., 6: 42-48.
    CrossRef  |  Direct Link  |  

  6. Sharma, A., A. Dwivedi and D.B. Ojha, 2011. Secure transmission of imperative picturesque content with key agreement protocol. Int. J. Comput. Inform. Syst., 2: 32-36.
    Direct Link  |  

  7. Ojha, D.B., A.Sharma, B. Kumar, A. Dwivedi and A. Kumar, 2011. Secure and authenticated visual content transmission with codebase cryptosystem. Int. J. Adv. Res. Comput. Sci., 2: 643-645.
    Direct Link  |  

  8. Ojha, D.B., A. Sharma, R. Singh, A. Shukla and M. Sahni, 2011. Cryptic E-mailing Scheme Over Stymieing Channel. Int. J. Adv. Eng. Sci. Technol., 3: 155 -158.
    Direct Link  |  

  9. Ojha, D.B., A. Sharma, A. Dwivedi, N. Pandey and A. Kumar, 2011. An authenticated transmission of medical image with codebase cryptosystem over noisy channel. Int. J. Adv. Network. Appl., 2: 841-845.
    Direct Link  |  

  10. Ojha, D.B., A. Sharma, A. Dwivedi, N. Pandey and A. Kumar, 2011. An approach for secure transmission of large medical data using post quantum cryptosystem. Adv. Comput. Sci. Technol., 4: 73-81.
    Direct Link  |  

  11. Dwivedi, A., D.B. Ojha, A. Sharma and A. Mishra, 2011. A key-agreement protocol using polynomials root problem over non-commutative division semirings. Int. J. Comput. Inform. Syst., 2: 60-63.
    Direct Link  |  

  12. Ajay, S., 2011. Biometric template security using code base cryptosystem. Information and Security. Int. J. Spec. Cyber Secur. Challenges Responses, (In Press). .

  13. Ajay, S., 2011. A Multi-biometric template security: an application of code base cryptosystem. Int. J. Comput. Sci. Eng. Sys., (In Press). .

  14. Ajay, S., 2011. Transmission of large information through kap using non-abelian group. J. Global Res. Comput. Sci., 2: 120-125.
    Direct Link  |  

  15. Sharma, A., N. Pandey, A. Dwivedi, A. Kumar and D.B. Ojha, 2010. An approach for two-tier security on transmission of medical image using post quantum cryptosystem over teeming channel. Int. J. Adv. Eng. Sci. Technol., 1: 10-15.

  16. Sharma, A. and D.B. Ojha, 2010. Secure and unique biometric template using post quantum cryptosystem. Int. J. Comput. Intell. Inform. Secur., 1: 53-61.

  17. Sharma, A. and D.B. Ojha, 2010. Application of coding theory in fuzzy commitment scheme. Middle-East J. Scientific Res., 5: 445-448.
    Direct Link  |  

  18. Ojha, D.B., R. Singh, A. Sharma, A. Mishra and S. garg, 2010. An innovative approach to enhance the security of data encryption scheme. Int. J. Comput. Theor. Eng., 2: 380-383.
    Direct Link  |  

  19. Ojha, D.B., J.P.Pandey, A. Sharma and A. Dwivedi, 2010. A Non-repudiable biased bitstring commitment scheme on a post quantum cryptosystem. J. Appl. Theor. Inf. Technol., 12: 40-44.
    Direct Link  |  

  20. Ojha, D.B., A. Sharma, R. Singh, S. Garg and A. Mishra et al., 2010. An analysis of fraudulence in fuzzy commitment scheme with trusted party. Int. J. Comput. Sci. Secur., 3: 578-582.
    Direct Link  |  

  21. Ojha, D.B., A. Sharma, R. Singh and S. Garg, 2010. An extensive security analysis of fuzzy commitment scheme. Int. J. Comput. Internet Secur., 2: 21-27.
    Direct Link  |  

  22. Ojha, D.B., A. Sharma, A. Dwivedi, N. Pandey and A. Kumar, 2010. Space-age approach to transmit medical image with codebase cryptosystem over noisy channel. Int. J. Eng. Sci. Technol., 2: 7112-7117.
    Direct Link  |  

  23. Ojha, D.B., A. Sharma, A. Dwivedi, B. Kumar and A. Kumar, 2010. An authenticated two-tier security on transmission of medical image using codebase cryptosystem over teeming channel. Int. J. Comput. Appl., 12: 22-26.
    Direct Link  |  

  24. Ojha, D.B., A. Dwivedi, A. Sharma and R. Singh, 2010. A non-repudiable biased bitstring key agreement protocol (NBBKAP) using conjugacy problem in non-Abelian group. Int. J. Eng. Sci. Technol., 2: 4162-4166.
    Direct Link  |  

  25. Ojha, D.B. and A. Sharma, 2010. Transmission of picturesque content with code base cryptosystem. Int. J. Comput. Technol. Appl., 2: 127-131.
    Direct Link  |  

  26. Ojha, D.B. and A. Sharma, 2010. A fuzzy commitment scheme with mceliece cipher. Surv. Math. App., 5: 73-83.
    Direct Link  |  

  27. Ajay, S., D.B. Ojha, R. Singh and A. Shukla, 2010. A model of anonymous cum idiosyncratic machiavellian mailing system using steganographic scheme. Int. J. Comput. App., 8: 1-4.
    CrossRef  |  Direct Link  |  

  28. Ajay, S., D. B. Ojha, A. Dwivedi, B. Kumar and A. Kumar, 2010. Secure and error free transmission of audio/visual content. J. Global Res. Comput. Sci., 1: 12-15.

  29. Ajay, S., 2010. A fuzzy commitment scheme: An approach using ORDES. J. Eng. Sci. Technol., (In Press). .

  30. Roy, A., S. Pal and M.K. Maiti, 2009. A production inventory model with stock dependent demand incorporating learning and inflationary effect in a random planning horizon: A fuzzy genetic algorithm with varying population size approach. Comput. Ind. Eng., 57: 1324-1335.
    CrossRef  |  Direct Link  |  

  31. Pandey, J.P., D.B. Ojha and A. Sharma, 2009. Enhance fuzzy commitment scheme: An approach for post quantum cryptosystem. J. Applied Theoretical Inf. Technol., 9: 16-19.
    Direct Link  |