University of Colombo School of Computing, 35, Reid Avenue, Colombo 7, Sri Lanka
Phone : (94–11-) 2589123 , Fax : (94-11-) 2587239
Email: kasun AT ucsc DOT cmb DOT ac DOT lk

Wednesday, February 26, 2014

Research

Two Professors who changed my life

I do research in the areas of { Multi-party security models, Secure multi-party electronic transactions and document protection, Public key cryptography and certification infrastructures, Hardware security tokens and devices, Web security and privacy, Security in wireless ad-hoc and sensor networks, Digital Forensic and ICT4D }.
Visit: {SCoRe Lab ,My Google Scholar Profile Page}
 
International Publications:
  1. Listening to the Giants: Using Elephant Infra-Sound to Solve the Human-Elephant Conflict, Poshitha Dabare, Chathura Suduwella, Asanka Sayakkara, Damitha Sandaruwan, Chamath Keppitiyagama, Kasun De Zoysa, Kasun Hewage, and Thiemo Voigt. . In Proceedings of the 6th Workshop on Real World Wireless Sensor Networks, RealWSN 2015, Seoul, South Korea.
  2. Wireless Sensing: What Simplicity has to Offer?, Asanka Sayakkara, Chathura Suduwella, Charith Shalitha, Rumesh Hapuarachchi, Chamath Keppitiyagama and Kasun De Zoysa, In 12th IEEE International Conference on Mobile Ad hoc and Sensor Systems, MASS 2015, Dallas, USA.
  3. Secure Dynamic Access Control Mechanism for Shared Wireless Sensor Networks, D.T.N.I. Perera, Kasun de Zoysa, Jeevani Goonathillake and Asanka Sayakkara, In 10th International Conference on Systems and Networks Communications, ICSNC 2015, Barcelona, Spain.
  4. My Sensors: A System for Secure Sensor Data Sharing Over Internet, Edirisuriya Mudalige Dilanga Siriwardane, Asanka Sayakkara, Vigitha Ekanayake and Kasun De Zoyza, In Proceedings of the International Conference on Advances in ICT for Emerging Regions, ICTer 2013, Colombo, Sri Lanka.
  5. Declarative Interface for In-network Actuation on Wireless Sensor-Actuator Networks, Asanka Sayakkara, Jeevani Goonathillake and Kasun De Zoysa, In Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, NESEA 2012, Liverpool, UK.
  6. TikiriPower Using TikiriDB abstraction on Smart Home systems, Lakmal Weerawarne, Asanka Sayakkara, Dinuni Fernando, Chathura Suduwella, and Kasun De Zoysa, In Proceedings of the International Conference on Advances in ICT for Emerging Regions, ICTer 2012, Colombo, Sri Lanka.
  7. Poster abstract: A declarative interface for smart-phone based sensor network systems, A. P. Sayakkara and K. De Zoysa , In 2nd International Workshop on Mobile Sensing, Beijing, China, 2012.
  8. The deployment of tikiridb for monitoring palm sap production, A. P. Sayakkara, W. S. N. P. Senanayake, K. Hewage, N. M. Laxaman, and K. De Zoysa. , In Proceedings of the 4th international conference on Real-world wireless sensor networks, REALWSN, pages 182185, Springer-Verlag, Berlin, Heidelberg, 2010.
  9. TikiriAC: Node Level Equally Distributed Access Control for Shared Sensor Network Databases, Nayanajith M. Laxaman, M. D. J. S. Goonatillake, Kasun De Zoysa, Real World Sensor Network Workshop (REALWSN'10), University of Colombo School of Computing, Sri Lanka, 16th and 17th December 2010
  10. TikiriDB: Shared Wireless Sensor Network Database for Multi-User Data Access, Nanayanajith M. Laxaman, M. D. J. S. Goonathillake, Kasun De Zoysa. 28th National Information Technology Conference, The Computer Society of Sri Lanka, Sri Lanka, 11th 12th August 2010
  11. Comparative Feature Analysis for "Forensic Investigation Toolkit for a Developing Country (FIT4D)", Yasantha N Hettiarachchi, T.N.K. De Zoysa, Keerthi Goonathillake, 28th National Information Technology Conference, The Computer Society of Sri Lanka, Sri Lanka, 11th 12th August 2010
  12. Accessing the University Learning Management System through Voice Communication, Thushari Atapattu, Sashikantha Wanasinghe, Kasun De Zoysa, Lakshman Jayaratne, 27th National Information Technology Conference, The Computer Society of Sri Lanka, Sri Lanka, 9th to 10th September 2009
  13. E-Stamping: A Mechanism to Authenticate Printed Documents, W.A.T Lakmali, Kasun De Zoysa, 27th National Information Technology Conference, The Computer Society of Sri Lanka, Sri Lanka, 9th to 10th September 2009
  14. A Low Cost Infrasound Recording System, Girisha Durrel De Silva, Kasun De Zoysa, 27th National Information Technology Conference, The Computer Society of Sri Lanka, Sri Lanka, 9th to 10th September 2009
  15. An Extensible Mobile Commerce Infrastructure for Sri Lanka: A Deployment Approach, Kasun Samarasinghe, N.M.L Laxaman, Avinesh Munasinghe, Ishara Lokuge, Kasun de Zoysa, 27th National Information Technology Conference, The Computer Society of Sri Lanka, Sri Lanka, 9th to 10th September 2009
  16. Developing a Forensic Software Toolkit for Sri Lanka, Yasantha N Hettiarachchi, Kasun De Zoysa, Keerthi Goonathillake, 27th National Information Technology Conference, The Computer Society of Sri Lanka, Sri Lanka, 9th to 10th September 2009
  17. V-Learning: Using Voice for Distant Learning in Emerging Regions, Thushari Atapattu, Kasun De Zoysa, International Conference on Computer Supported Education, Lisbon, Portugal, March 2009.
  18. Experiences on Mobile-ATM Deployment in a Developing Country, Amila Karunanayake, Kausn De Zoysa, Sead Muftic, Feng Zhang, 1st International Conference on Mobile Communication for Development(M4D), Karlstad University, Sweden, 11–12 December, 2008
  19. Pokuru PC: A Low Cost Multi-Terminal, Girisha Durrel De Silva, N.M.Laxaman, Kasun De Zoysa, Chamath Keppitiyagama, 26th National IT Conference, Colombo, Sri Lanka, 2008
  20. Mobile ATM for Developing Countries, Amila Karunanayake, Kasun De Zoysa, Sead Muftic, The 3rd ACM International Workshop on Mobility in the Evolving Internet Architecture, Seattle, WA, USA, 2008
  21. Automated Pothole Detection System, Girisha D. De Silva, Ravin S. Perera, Nayanajith M. Laxman Kenneth, M. Thilakarathna, Chamath I. Keppitiyagama, Kasun De Zoysa, International IT Conference (IITC'08), Colombo, Sri Lanka, 28th and 29th October, 2008
  22. Developing a Digital Forensic Framework for a Third World Country, Kasun De Zoysa, Keerthi Goonathillake, Ravith Botejue, 2nd International Conference on Cybercrime Forensics Education and Training, Canterbury Christ Church University, UK, September 1-2, 2008
  23. Poster Abstract: BusNet Data Transfer Protocol, T. G. T. A. Bandara, Kasun De Zoysa, Chamath Keppitiyagama, Nayanajith Laxaman, Kenneth Thilakarathna, 3rd International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, Australia, December 3-6, 2007
  24. A Public Transport System Based Sensor Network for Road Surface Condition Monitoring, Chamath Keppitiyagama, Kasun De Zoysa, Gihan Seneviratne, Weerathunga Shihan, Workshop on Networked Systems for Developing Regions, ACM conference of the Special Interest Group on Data Communication (SIGCOMM 2007), Kyoto, Japan, August 27, 2007
  25. Cybercrime Forensics Experiences in a Developing Country, Kasun De Zoysa, K. S. Goonatillake, Kenneth M. Thilakarathna, 1st International Conference on Cybercrime Forensics Education and Training, Canterbury Christ Church University, UK, September 6-7, 2007
  26. Poster Abstract: BusNet - A Sensor Network Built Over a Public Transport, Kasun De Zoysa,Chamath Keppitiyagama, 4th European Conference on Wireless and Sensor Networks, Delft, Netherlands, January 29-31, 2007
  27. SOW : Secure Open Webmail, Milinda Ahan Tissera, Kasun De Zoysa, International IT Conference (IITC'06), Colombo, Sri Lanka, October 12-13, 2006
  28. TCP : Trusted Cheque Protocol, Seshika Fernando, Kasun De Zoysa, International IT Conference (IITC'06), Colombo, Sri Lanka, October 12-13, 2006
  29. SIM: Secure Instant Messaging for Yahoo, Nirodha Abeywardena, Kasun De Zoysa, International IT Conference (IITC'05), Colombo, Sri Lanka, November 9-10, 2005
  30. eTrap: An innovative Method to Prevent Spam, Kasun De Zoysa, Lakmal Warusawithana, Conference on Information Systems Security, Audit, Control, and Governance, Colombo, Sri Lanka, 1st and 2nd April 2005
  31. Secure Dynamic Group Establishment Protocol for Web Services, Kasun De Zoysa, Chamidu Atupelage, International IT Conference (IITC'05), Colombo, Sri Lanka, November 9-10, 2005
  32. FraMaS: Fraud Management System for Online Credit Card Transactions, K.D.C. Anuradha, Kasun De Zoysa, International IT Conference (IITC'05), Colombo, Sri Lanka, November 9-10, 2005
  33. Unified Certificate Verification Protocol, Kasun De Zoysa, Third Internal Workshop on Applied PKI (IWAP 2004), Fukuoka, Japan, October 3-5, 2004
  34. The Concept of A Multi-Application Smart Card, Kasun De Zoysa, Sead Muftic, Workshop on Information System Security (WSTI’03), Alger, Algeria, December 8-10, 2003
  35. eMoney Order System: The Smart way to Pay Online, Kasun De Zoysa, Rasika Dayarathne, International IT Conference (IITC'03), Colombo, Sri Lanka, December 1-7, 2003
  36. A Notarization Authority for the Next Generation of E-Mail Systems, Hiran Ekanayake, Kasun De Zoysa, Rasika Dayarathne, International IT Conference (IITC'03), Colombo, Sri Lanka, December 1-7, 2003
  37. Web Based Generic File Protection System, Bimali Arsakularatne, Kasun De Zoysa, Rasika Dayarathne, International IT Conference (IITC'03), Colombo, Sri Lanka, December 1-7, 2003
  38. A Survivable Group Security Architecture, Sead Muftic, Gernot Schmölzer, D. Sierra, Kasun De Zoysa, NSA/LUCITE Project Report, CSPRI/GWU, December, 2002
  39. "Bi-directional Web Document Protection System for Serious E-commerce Applications", Kasun De Zoysa, Sead Muftic, Workshop on Trusted Computing Paradigms, International Conference on Parallel Processing 2002, Vancouver, British Columbia, Canada, August 18-21, 2002
  40. An Enhanced Security Mechanism for General Purpose Email Clients, Kasun De Zoysa, Rasika Dayarathne, International Conference on Computer Communication, Mumbai, India, August 11-14, 2002
  41. "Electronic Signatures and Certification Authorities" – Essential technological measures to minimize legal barriers to Electronic Transactions, Jayantha Fernando, Kasun De Zoysa, 20th National IT Conference, Colombo, Sri Lanka, 20011.
  42. Web based Multi-Application Smart Card Security System, Kasun De Zoysa, Sead Muftic, International IT Conference (IITC'00), Colombo, Sri Lanka, January 17-19, 2001
  43. Comprehensive Security System for World Wide Web (WWW) based on Smart Cards Technologies, Kasun De Zoysa, Workshop on Emerging Issues in Computer and Systems Sciences, Stockholm, Sweden, September 29 - 30, 2000
  44. WWW System for Secure Electronic Transaction, Sead Muftic, Kasun De Zoysa, International IT Conference (IITC'99), Colombo, Sri Lanka, 1999
  45. Network Friendly Search Engine For the Internet, Kasun De Zoysa, Ruvan Werasinghe, Multi Disciplinary International Conference on the Occasion of 50th Anniversary of Independence of Sri Lanka held at University of Peradeniya, Sri Lanka, 1998

Contributed Research Projects:
  • Principal Investigator, Social Sensor Networks for Opinion Analysis (NRC Grant No: 11-25), research project financed by The National Research Council (NRC) of Sri Lanka, January 2012 to December 2014
  • Principal Investigator, M-ATM: Mobile ATM research project, International research cooperation between Department of Computer and System Sciences, Stockholm University, Sweden and Department of Communication and Media Technologies, University of Colombo School of Computing, Sri Lanka, financed by The Swedish Program for Information and Communication Technology in Developing Regions (SPIDER), January 2008 to December 2010
  • Principal Investigator, Virtual IPV6 Network Test Bed (VIPNet), International research cooperation between The Information Society Innovation Fund (ISIF) and Department of Communication and Media Technologies, University of Colombo School of Computing, Sri Lanka, financed The International Development Research Centre (IDRC), Asia Pacific Network Information Center (APNIC) and Internet Society (ISOC) since March 2010
  • Principal Investigator, A Low Cost Digital Forensic Laboratory for a Developing Country, International research cooperation between The Information Society Innovation Fund (ISIF) and Department of Communication and Media Technologies, University of Colombo School of Computing, Sri Lanka, financed The International Development Research Centre (IDRC), Asia Pacific Network Information Center (APNIC) and Internet Society (ISOC), February 2009 to June 2010
  • Principal Investigator, V-Learning research project, International research cooperation between IBM Research India Ltd., India and Department of Communication and Media Technologies, University of Colombo School of Computing, Sri Lanka, financed by IBM and The Swedish International Development Cooperation (Sida), January 2008 to August 2010
  • Principal Investigator, Adaptive Sensor System for Elephant Tracking(ASSET), Born Free Foundation, UK, October 2008 to June 2009
  • Principal Investigator, The Smart Computer Laboratory, International research cooperation between Internet Society (ISOC) and Old Boy Association of Dharmashoka College, Sri Lanka January 2008 to January 2009
  • Principal Investigator and Research Advisor, Ad-hoc and Sensor Network research project, International research cooperation between Ericsson, Sweden and Department of Communication and Media Technologies, University of Colombo School of Computing, Sri Lanka, financed by The Swedish Program for Information and Communication Technology in Developing Regions (SPIDER), January 2006 to June 2008
  • Research Advisor, e-Money Order System, Information and Communication Technology Agency (ICTA), Sri Lanka and Department of Communication and Media Technologies, University of Colombo School of Computing (UCSC), Sri Lanka, financed by World Bank, 2004
  • Research Scientist, A Survivable Group Security Architecture, Design and implementation of the GSAKMP and Secure GSA Application based on SELinux, George Washington University, Funded by National Security Agency (NSA), USA, 2003
  • Research Scientist, An Intrusion Detection System using Mobile Agents, George Washington University, Funded by Defense Advance Research Project Agency (DARPA), USA, 2002
  • Research Scientist, Design and Implementation of Generic Security Objects, George Washington University, Funded by Defense Advance Research Project Agency (DARPA), USA, 2002
  • Research Scientist, Federal Bridge Certification Authority Interoperability Test Project, Conducted by The National Institute of Standards and Technology (NIST), USA, As a guest researcher in SETECS PKI Cooperation, Sweden, 2002
  • Researcher, A Security Architecture for Multi-Party Transaction, Stockholm University and University of Colombo, Funded by Sida/SAREC IT Project between the Department of Computer and System Sciences (DSV) and the University of Colombo School of Computing (UCSC), Sweden-Sri Lanka, 1999 to 2003
  • Researcher, The Concept of A Secure WWW System based on Smart Cards and Certification Technologies, Stockholm University and University of Colombo, Funded by Sida/SAREC IT Project between the Department of Computer and System Sciences (DSV) and the University of Colombo School of Computing (UCSC), Sweden-Sri Lanka, 1999 to 2000
  • Research Assistant, Capacity and Topology Planning for Lanka Educational & Research Network (LEARN) through Computer Simulation & Modeling, University of Colombo, Funded by University of Colombo, Sri Lanka, 1998

2 comments:

  1. Multi-Party Security Models
    Multi-party security models are designed to protect data and systems involving multiple parties. These models ensure that sensitive information remains confidential and secure while allowing authorized parties to collaborate and compute on shared data without revealing individual inputs.

    Key Challenges:

    Confidentiality: Protecting sensitive data from unauthorized access.
    Integrity: Ensuring data is not modified or tampered with.
    Availability: Maintaining system accessibility and reliability.
    Authentication: Verifying the identity of participating parties.
    Authorization: Controlling access to specific data and operations.
    Common Multi-Party Security Models:

    cyber security projects for students


    Access Control Models: Restrict access to data and systems based on user roles and permissions.
    Cryptography: Employ encryption techniques to protect data in transit and at rest.
    Secure Multi-party Computation (SMPC): Enables multiple parties to compute a function over their private inputs without revealing individual inputs.
    Federated Learning: Trains machine learning models on decentralized data without sharing raw data.

    ReplyDelete

Total Pageviews

Popular Posts

Copyright © Dr. Kasun De Zoysa | Powered by Blogger
Design by Viva Themes | Blogger Theme by NewBloggerThemes.com