Professional Activities


Peer Reviewer for the following Journals, Conferences, and Books

  1. J. of Applied Security Research, 2020.
  2. IEEE Access, 2019.
  3. J. of Parallel and Distributed Computing (Elsevier), 2019.
  4. Book review for Chapman & Hall/CRC, 2017.
  5. J. of IET Information Security, 2017, 2018
  6. Int. Conf. on Computer Science and Application Engineering (CSAE 2017), Shanghai, China, Oct 2017.
  7. J. of Computational and Theoretical Nanoscience, 2017.
  8. Int. J. of Foundations of Computer Science, 2017, 2018.
  9. AMS Contemporary Mathematics, 2015.
  10. Designs, Codes and Cryptography, 2015.
  11. Sensors, 2014.
  12. J of Computing and Information Technology (CIT), 2013, 2014, 2014, 2015.
  13. The 23rd Wireless and Optical Communications Conference (WOCC 2014), Newark, NJ, May 2014.
  14. J of Groups - Complexity - Cryptology (GCC), 2011, 2013.
  15. The 5th Int. Conf. on Communications, Computers and Applications (MIC-CCA 2012), Istanbul, Turkey, Oct 2012.
  16. Frontiers of Computer Science (Springer), 2012.
  17. Security and Communication Networks (Wiley), 2008, 2009, 2010, 2010, 2012, 2012.
  18. The 4th Int. Conf. on Networked Digital Technologies (NDT 2012), Dubai, UAE. Apr 2012.
  19. The 8th Int. Conf. on Cybernetics and Information Technologies, Systems and Applications (CITSA 2011), Orlando, FL, July 2011.
  20. The 3rd Int. Conf. on Networked Digital Technologies (NDT 2011), Macau, China. July 2011.
  21. IEEE J. on Selected Areas of Communications (J-SAC), 2010, 2011.
  22. The 2nd Int. Conf. on Networked Digital Technologies (NDT 2010), Prague, Czech Republic, July 2010.
  23. Int. J. of Quantum Information (IJQI), May 2010.
  24. 2010 Int. Conf. on Computational Science and Applications (ICCSA 2010), Fukuoka, Japan, Mar 2010.
  25. The 1st Int. Conf. on Network and Service Security 2009 (N2S 2009), Paris, France, June 24-26, 2009.
  26. IEEE Sarnoff Symposium 2007, Princeton, NJ, May 2007.
  27. The 2007 Int. Conf. on New Technologies, Mobility and Security, Paris, France, May 2007.

Lectures and Papers Presented

  1. The fundamentals of cyber security. The NYC Louis Stokes Alliance for Minority Participation (NYC-LSAMP) Program. College of Staten Island, Staten Island, NY, Apr 15, 2019.
  2. Parallel hash collision search by rho method with distinguished points. The 14th IEEE LISAT 2018, Farmingdale, NY, May 4, 2018.
  3. Bitcoins, digital signatures, and hash functions. Seminar in Computer Science, College of Staten Island, Staten Island, NY, Apr 9, 2018.
  4. A new Bloom filter structure for searchable encryption schemes. 9th New York Computer Science and Economics Day (NYCE 2017), NYU, New York, NY. May 19, 2017, poster presentation.
  5. Bloom filters and their applications in searchable encryption schemes. 1129TH AMS Meeting, AMS 2017 Spring Eastern Sectional Meeting - Cryptography III, New York, NY, May 6-7, 2017.
  6. Finding partial hash collisions by brute force parallel programming. The 13th IEEE LISAT 2017, Farmingdale, NY. May 5, 2017.
  7. A new Bloom filter structure for searchable encryption schemes. 7th ACM Conf. on Data and Application Security and Privacy, Scottsdale, AZ, Mar 22-24, 2017, poster presentation.
  8. Finding partial hash collisions by brute force parallel programming. The 37th IEEE Sarnoff Symposium, Newark, NJ, Sept 19-21, 2016, poster presentation.
  9. User density and spatial cloaking algorithm selection: improving privacy protection of mobile users. The 37th IEEE Sarnoff Symposium, Newark, NJ, Sept 19-21, 2016, poster presentation.
  10. Introduction to cryptography. CSI Computer Science Club, Staten Island, NY, Nov 11, 2014.
  11. Implementation of randomize-then-combine constructed hash function. The 23rd WOCC, Newark, NJ, May 9-10, 2014.
  12. Experiments for leveled RFID localization for indoor stationary objects. ITNG 2014, Las Vegas, NV, Apr 8, 2014.
  13. Hash function based secret sharing scheme designs. Int. Energy & Sustainability Conf. 2013, Track E: Cyber Security & Smart Energy Systems, Farmingdale, NY, Mar 22, 2013.
  14. Leveled indoor localization algorithms based on passive RFID. ICWN 2012, Las Vegas, NV, July 2012.
  15. Leveled indoor localization algorithms based on passive RFID. The STEAM Event of CSI, Staten Island, NY, Mar 29, 2012.
  16. Hash function based secret sharing scheme designs. Algebra and Cryptography Seminar (CUNY and Stevens), New York, NY, Oct 14, 2011.
  17. Improving Latin square based secret sharing schemes. Special Session on Mathematical Aspects of Cryptography and Cyber Security, AMS 2011 Fall Eastern Sectional Meeting, Cornell University, Ithaca, NY, Sept 10-11, 2011.
  18. Internet of Things - concept, technology, application and future development. CSI Computer Science Seminar, Staten Island, NY, Mar 31, 2011.
  19. A new scheme for cryptographic hash function construction. The Second STEAM Event of CSI, Staten Island, NY, Mar 16, 2011, poster presentation.
  20. RFID technology and security. CSI Computer Science Seminar, Staten Island, NY, Dec 9, 2010.
  21. A new scheme for hash function construction. SAM 2010, Las Vegas, NV, July 2010.
  22. RFID system and biometrics. CUNY 8th Annual IT Conf., New York, NY, Dec 4, 2009.
  23. Applied cryptography for undergraduate research. STEAM Event Meeting, CSI, Staten Island, NY, Nov 19, 2009.
  24. Logical analysis of RFID authentication protocols. Algebra and Cryptography Seminar (CUNY and Stevens), New York, NY, Oct 23, 2009.
  25. Analysis of RFID authentication protocols based on static and dynamic shared secret. SAM 2009, Las Vegas, NV, July 2009.
  26. Logic analysis of two RFID authentication protocols. CITSA 2009, Orlando, FL, July 2009.
  27. RFID technologies. Cryptography and Cryptanalysis Seminar (CUNY), New York, NY, Nov 21, 2008.
  28. RFID technologies and RFID authentication protocols. Algebra and Computation Seminar, Center for Logic, CUNY - CityTech, Brooklyn, NY, Oct 7, 2008.
  29. Multi-map orbit hopping chaotic cipher. SAM 2008, Las Vegas, NV, July 2008.
  30. What is wrong with these RFID authentication protocols? The 3rd Annual Conf. on Computer and Human Error, New York, NY, Dec 2007.
  31. A chaotic cipher Mmohocc and its security analysis. 2007 SPIE Defense and Security Conf., Orlando, FL, Apr 2007.
  32. A simple secure quantum authorization scheme. 2007 SPIE Defense and Security Conf., Orlando, FL, Apr 2007.
  33. A chaotic cipher Mmohocc and its randomness evaluation. 6th Int. Conf. on Complex Systems, Boston, MA, June 2006.
  34. A chaotic cipher Mmohocc and its randomness evaluation. Algebra and Cryptography Seminar (CUNY and Stevens), New York, NY, Dec 2006.
  35. A class of RS-RNS concatenated codes: construction and performance. IEEE ICCT 1998, Beijing, China, Oct 1998.
  36. Performance analysis of cellular DS-SFH systems. IEEE ICCT 1998, Beijing, China, Oct 1998.
  37. Chebyshev-map chaotic spread spectrum sequences. ICPMSC 1998, Shanghai, China, June 1998.
  38. MC-CDMA with chaotic SS sequences for wireless ATM networks. ICPMSC 1998, Shanghai, China, June 1998.

Conferences and Workshops Organized

  1. NYC DOE Division of Learning and Teaching Interactive Learning Session (for CS Graduate Students), CUNY - CSI, Staten Island, NY, Dec 5, 2017.
  2. AMS Spring Eastern Sectional Meeting #1129, Special Session on Cryptography, New York, NY, May 6-7, 2017.
  3. Workshop of 2010 Information Retrieval, Security and Innovative Applications (RSIA 2010), Fukuoka, Japan, Mar 23-26, 2010.

Technical Program Committee Member and Session Chair for the following Conferences

  1. The 29th Wireless and Optical Communications Conference (WOCC 2020), Newark, NJ, May 2020. TPC.
  2. The 39th IEEE Sarnoff Symposium (Sarnoff 2018), Newark, NJ, Sept 24-25, 2018. Session chair.
  3. The 23rd Wireless and Optical Communications Conference (WOCC 2014), Newark, NJ, May 9-10, 2014. TPC & session chair.
  4. The 2012 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE 2012), Kota Kinabalu, Malaysia, Dec 2012. TPC.
  5. The 2012 Int. Conf. on Wireless Networks (ICWN 2012), Las Vegas, NV, July 16-19, 2012. Session chair.
  6. The Fourth Int. Conf. on Networked Digital Technologies (NDT 2012), Dubai, UAE, Apr 2012. TPC.
  7. The Third Int. Conf. on Networked Digital Technologies (NDT 2011), Macau, China, July 2011. TPC.
  8. The 2010 Int. Conf. on Security and Management (SAM 2010), Las Vegas, NV, July 12-15, 2010. Session co-chair.
  9. The 6th Int. Conf. on Cybernetics and Information Technologies, Systems and Applications (CITSA 2009), Orlando, FL, July 10-13, 2009. Session co-chair.
  10. The 2009 Int. Conf. on Security and Management (SAM 2009), Las Vegas, NV, July 13-16, 2009. Session chair.