Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

ZNs New CV

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

DR.

ZULKHARNAIN
Hno. 6-1-59 Gulshan amena, I floor back portion, Vishalnagar Hyderabad 500008 INDIA.

Permanent Addres: c/o Mrs. Nayeemunissa Flat 101, Maphar Gulmohur


apartment, new mallepally, Hyderabad AP India 500001
 Phone: 00919494442177, 00919866652501, 009197921490 zulkharnain@gmail.com
zulkharn@msn.com

Presently working as Professor at Al-Habeeb college of Engineering and


Technology, Hyderabad India since one year after earning PhD
 Holds Masters Degree in Digital System and Computer Electronics, and PhD., in
electronics and communication Engineering from India’s accredited and premier
University Jawaharlal Nehru Technological University , Hyderabad.
(www.jntu.ac.in)
 20 years of Teaching Experience before earning PhD including 9 Years of
Administrative Experience in various Engineering colleges in India, among which
10 years Post PG -Teaching Experience

Education, Honors, and Certifications

 PhD., Electronics and communication engineering JNTUH, July 2009


 Master of technology in Digital System and Computer Electronics, from JNTUH,
India- 2001
 Bachelor of Electronics and Communication Engineering from Indian accredited
Gulbarga University-1989
 Reviewer of International Journal of Network Security 2006-10 & Journal of
Engineering and Computer Innovation 2010.
 Reviewed IEEE published Book- Computer Forensics 2007
 Bachelor of Law and PG Diplomas in Business Management and Personal
relations from Kakatiya University, Warangal, India.
 Published paper in International Journal on Logistics on Smart card, in
2008.Published 3 papers in Academic open Internet Journal.
 Chaired 3 National Seminars on Smart card in India
 Chaired 2 National conferences in India

As Research Scholar in ECE of JNTUH

 Selected and admitted in 2004 for PhD


 Published 3 papers in AOI Journal of International Bulgarian University in 2006
 Paper published in International Journal of Intelligent Systems, 2008.
 Paper published in International conference of Systemic and Cybernetics
 Published one paper in RFID Journal in 2007
 Paper accepted for JNTU’s Technology Spectrum Journal in Feb 2008

Page 1
1. Research paper on: Bluetooth -a failed technology for mobile payment
 Author: Zulkhar Nain
 Category IT and Computing
 Abstract: any time anywhere delivery is the peculiarity of M-Commerce. It is a Wireless
Technology. Its is also a boosting technology of Commerce transactions, using
Wireless media. It also makes it complex. It is an application of Pervasive and
Ubiquitous Global computing. Bluetooth is a latest trend as a channel for M-Commerce
transaction. This paper explores the possibilities of latest trends in Bluetooth and its
feasibility with M-commerce.

URL (full text) http://www.acadjournal.com/2006/v19/part6/p4/

2. Research paper on: Reverse Engineering RFID


 Author Zulkhar Nain
 Category IT and Computing
 Abstract RFID smart cards are well in use for better management of products in almost
all developed countries. The technology that most of them use is not upto the mark and
need revision. The purpose of this paper is to highlight some of those important
discrepancies, so as to enable them to update their technology. This paper is
presented in the form of ethical hacking RFID tags, whose inspiration for the small
project was secured from the references given in the last. Details are avoided, so as to
disable the Hackers to practise on detailed experiments if discussed. It is well known
fact that RFID smart cards operate within 10 cm radius. Within this zone they are also
prone to Relay attack. By using a trick, an attacker can fool the reader who is within
50m, and simulates an environment to make it sense as if it is within 10 cm. This is an
economical pick pocket system, which need to be educated for the user of the card, as
well as the Manufacturers. The purpose of the paper is for the same.

URL (full text) http://www.acadjournal.com/2006/v19/part6/p5/

3. Research paper on: Securing Digital signature in Mobiles


 Author Zulkharnain
 Category IT and Computing
 Abstract: it is a basic of Digital signature scheme that, the signing key is to be kept
secret. Herein I discuss a smart card reader in a mobile device, for using Digital sign.
Here settings for Digital sign applications as well as their problems are discussed;
along with that a framework for Mobile security applications are also considered. The
related security issues are also discussed. It is always necessary to carefully manage
private key handling, and a solution for that is presented.

URL (full text) http://www.acadjournal.com/2007/V20/part6/p5/

4. Research paper on: Security for SIM card- International conference on Systemic,
Cybernetics and informatics -paper ID CC- 9.7 Hyderabad 2008.
5. Research paper on: RFID SMART CARD rhttp://www.rfidjournal.com/whitepapers/2/2.

Page 2
ABSTRACT OF PHD EARNED
Smart Cards represent one of the physically smallest, yet most widely
used applications for Embedded Microprocessors. Within a few square
millimeters of silicon, Smart Cards contain a complete microprocessor
system, including a processor (and often a coprocessor), volatile and non-
volatile memories, and input/output. Despite their small size, Smart Cards
also represent one of the most security-critical of all embedded
applications. Hundreds of millions of these tiny embedded systems are in
use today in applications such as SIM i.e., Subscriber Identity for mobile
telephone handsets, banking, fare systems for public transport, and
physical and network access systems.
This thesis is outcome of my work done under the Smart card project of
IDRBT, Hyderabad during 2003 to 2006. This thesis investigates the
Digital Security system by implementation of secure log file handling
mechanisms, using recent smart card improvements. Initially, we examine
how smart cards evolved from single application cards into true multi-
application cards. Additionally, we present the most recent architectures
(client application interfaces) that enable client applications to interface
with smart card applications. Previous proposals for maintaining log files
in smart cards are very limited and mostly theoretical. We examine those
most related to smart cards along with presenting the very few real world
examples of log files. We go on to examine the new events that require
logging along with the requirements of the entities involved.
Subsequently, we describe an ideal event-logging model for a multi-
application smart card environment. To meet the identified requirements,
we describe the details of a smart card entity that is responsible for
dynamically updating the smart card log files. In that context, along with
providing adequate log file space management, we propose a possible
standard log file format for smart cards. In the core part of the thesis we
describe three different smart card log file download protocols, the
selection of which depends on the requirements of the entities involved.
These protocols download audit data to another entity that does not suffer
from immediate storage restrictions. Finally, we describe implementation
details and performance measurements of both the log file download
protocol and the standard log file format in two of the most advanced
multi application smart cards. Here a case study is made for secure bank
transaction using MiFare contactless smart card.
Nowadays Indian banks are using Magnetic stripe cards for ATM
transactions, and they are not safe as they can be easily cloned. Smart
cards are well known for their digital security, and they are very secure,
comparatively. Some international banks have recently started using
smart card, but some cases have been reported of hacking them, making
use of data leakage from them. This thesis is an attempt to overcome the
problems of data leakage by making use of secure logging system, which
can be implemented, by not allowing the data to leak, moreover the
architecture proposed here is made more stronger to withstand the
attacks and by further designing can help self-destroy when attempt is
made to crack it. This system has been simulated on Java Cards and then
tested practically on contact type SR90 smart card system as well as

Page 3
contactless SR90c MiFare models. Henceforth we propose this architecture
for secure bank transaction as well as for authentication systems involving
smart cards, like internet access USB Dongles, Mobiles, Authenticated
Door entry, etc.,

COURSES AND THEIR LABS HANDLED:


1. LOGIC DESIGN
2. COMPUTER ARCHITECTURE
3. ELECTRONICS ENGINEERING
4. MICROPROCESSORS 8086
5. COMPUTER NETWORKS

Page 4

You might also like