Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Shishir Nagaraja
[go: Go Back, main page]

Computer Laboratory Home Page Search A-Z Directory Help
University of Cambridge Home Computer Laboratory
Shishir Nagaraja

Shishir Nagaraja

Researcher in Network Security

E-mail
shishir [dot] nagaraja [at] cl [dot] cam [dot] ac [dot] uk
Phone
+44 1223 763565
+44 7913 594019
Office
GE17, William Gates Building, Computer Laboratory

Curriculum Vitae

My current C.V. is available here.


Research Interests

My main area of interest is in the security aspects of complex networks. Complex networks are every where to be seen, they exhibit a range of properties at the topology level that affect the dynamic processes occuring on them. I study how conflict shapes networks and networks are in turn shaped by conflicts. My research studies into these aspects are stongly influenced by my philosophical perspective of security and conflict, which is the following. Security involves the negotiation of interests between various parties involved in communication. Where does human communication arise from? I believe it arises from confict. Conflict, not necessarily with the party you are communicating with, but certainly with one or more parties you can reach within a few hops. One of the projects I have been doing is the analysis of topological attack and defense in complex networks. How do various attack and defense mechanisms scale with network size, what is the best method of attacking various types of networks (classified by topology) and what is the best way of defending them. Some of the early work I have conducted in this regard is written up a technical report titled the topology of covert conflict. Other projects that I have been doing are the exploration of the evolution of cooperation in peer to peer networks, traffic analysis, and resilience analysis of the Internet. There should be more content about this soon.


Publications

Patents

  1. Shishir Nagaraja and Madhusudhana H S, "Method and System for Amassed Authorization", USPTO, 2001.
  2. Shishir Nagaraj, Natraj Sirisilla and H S Madhusudhana, "An adaptive method and system for user empowered management based on Dynamic Quorums", USPTO, November 2002.
  3. Ravi Kiran UVS and Shishir Nagaraja, "An Algorithm to cluster directory users into user communities based on similarity in access", USPTO 6,996,577, June 2006.
  4. Madhusudhana H S, Shishir Nagaraja and Aridaman Tripathi, "Security and Policy Integrity in multilateral authorization systems", USPTO 7,136,489, November 2006.

Papers and articles

  1. S. Nagaraja, Anonymity in the wild: Mixes on unstructured networks, Accepted at PET (Workshop on Privacy Enhancing Technologies), June 2007, Ottawa.
  2. S. Nagaraja, the topology of community hiding, Accepted at NAACSOS (Conference of North American Association for Computational Social and Organizational Sciences), June 2007, Atlanta.
  3. S. Nagaraja, On a dynamic topology of covert groups, Accepted at Sunbelt (8th European Social Network Conference, Corfu, Greece, May 2007.
  4. S. Nagaraja, Privacy Amplification with Social Networks, Accepted at SPW (Security Protocols Workshop), Brno, April 2007.
  5. R. Anderson, T. Moore, S. Nagaraja, A. Ozment, Incentives and Information Security, in Algorithmic Game Theory, N. Nisan, T. Roughgarden, E. Tardos, and V. Vazirani (editors), ISBN-13: 9780521872829, Cambridge University Press, 2007.
  6. T. Moore, J. Clulow, R. Anderson and S. Nagaraja, New Strategies for Revocation in Ad-Hoc Networks, Accepted at ESAS 2007 (European Workshop on Security and Privacy in Ad hoc and Sensor Networks).
  7. F. L. Wong, M. Lin, S. Nagaraja, I. Wassel and F. Stajano, Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern, Accepted at CNSR (Communication Networks and Services Research Conference), New Brunswick, Canada, May 2007.
  8. S. Nagaraja and R. Anderson, the topology of covert conflict, WEIS (Workshop on the Economics of Information Security), Cambridge, 2006.
  9. S. Nagaraja and R. Anderson, the topology of covert conflict, Technical Report 637, Computer Laboratory, University of Cambridge, 2005.
  10. S. Nagaraja and H S Madhusudhana, Time-sync independent Kerberos Authentication Protocol , submitted to IETF, 2002.

Work in progress

  1. S. Nagaraja, Evolutionary dynamics of conflict in large-scale social networks: An empirical study.
  2. S. Nagaraja and R. Anderson, Dynamic centrality: A new defense against topological warfare.


Previous Work

I obtained my B.E. majoring in computer science from Bangalore University in 1999. I joined the network security group at Novell Research at Bangalore, and worked there for about four years in various secure distributed computing projects. Some of the patents related to those pieces of work were issued recently, which you can see in the list above.

Personal

When not doing research work, I am usually dabbling with my camera. I try taking pictures with cultural or political messages. Recently, I have been doing photoshoots in wild life reserves which has been very exciting! I also play the Sitar an instrument popular in North India, Pakistan and Afganistan, and belongs to the Hindustani school of music. I belong to the Maihar Gharana of music.The Maihar Gharana is a new instrumental khyal gharana, born in the early 20th century, but it has had tremendous influence on the Hindustani instrumental music in the last fifty years. I play tennis in the 3rd team at Cambridge LTC, run half-marathons now and then, practise yoga and do a bit of gymnastics at the University Gymnastics Club