Skip to main content

Showing 1–10 of 10 results for author: Varshney, G

.
  1. arXiv:2406.09005  [pdf, other

    cs.CR

    Privacy Aware Memory Forensics

    Authors: Janardhan Kalikiri, Gaurav Varshney, Jaswinder Kour, Tarandeep Singh

    Abstract: In recent years, insider threats and attacks have been increasing in terms of frequency and cost to the corporate business. The utilization of end-to-end encrypted instant messaging applications (WhatsApp, Telegram, VPN) by malicious insiders raised data breach incidents exponentially. The Securities and Exchange Board of India (SEBI) investigated reports on such data leak incidents and reported a… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2406.09000  [pdf, other

    cs.CR

    A Passwordless MFA Utlizing Biometrics, Proximity and Contactless Communication

    Authors: Sneha Shukla, Gaurav Varshney, Shreya Singh, Swati Goel

    Abstract: Despite being more secure and strongly promoted, two-factor (2FA) or multi-factor (MFA) schemes either fail to protect against recent phishing threats such as real-time MITM, controls/relay MITM, malicious browser extension-based phishing attacks, and/or need the users to purchase and carry other hardware for additional account protection. Leveraging the unprecedented popularity of NFC and BLE-ena… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  3. arXiv:2311.04078  [pdf, other

    cs.CR

    A Lightweight and Secure PUF-Based Authentication and Key-exchange Protocol for IoT Devices

    Authors: Chandranshu Gupta, Gaurav Varshney

    Abstract: The Internet of Things (IoT) has improved people's lives by seamlessly integrating into many facets of modern life and facilitating information sharing across platforms. Device Authentication and Key exchange are major challenges for the IoT. High computational resource requirements for cryptographic primitives and message transmission during Authentication make the existing methods like PKI and I… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  4. arXiv:2305.19763  [pdf, ps, other

    physics.flu-dyn

    Numerical investigation of viscous fingering in a three-dimensional cubical domain

    Authors: Garima Varshney, Anikesh Pal

    Abstract: We perform three-dimensional numerical simulations to understand the role of viscous fingering in swee** a high-viscous fluid (HVF). These fingers form due to the injection of a low-viscous fluid (LVF) into a porous media containing the high-viscous fluid. We find that the swee** of HVF depends on different parameters such as the Reynolds number ($Re$) based on the inflow rate of the LVF, the… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

  5. An Improved Authentication Scheme for BLE Devices with no I/O Capabilities

    Authors: Chandranshu Gupta, Gaurav Varshney

    Abstract: Bluetooth Low Energy (BLE) devices have become very popular because of their Low energy consumption and hence a prolonged battery life. They are being used in smart wearable devices, smart home automation system, beacons and many more areas. BLE uses pairing mechanisms to achieve a level of peer entity authentication as well as encryption. Although, there are a set of pairing mechanisms available… ▽ More

    Submitted 28 April, 2022; originally announced April 2022.

    Journal ref: Computer Communications, Volume 200, 2023, Pages 42-53

  6. arXiv:2108.07157  [pdf, ps, other

    physics.gen-ph

    Bianchi type-III THDE quintessence model with hybrid expansion law

    Authors: Gunjan Varshney, Anirudh Pradhan, Umesh Kumar Sharma

    Abstract: The current research investigates the behavior of the Tsallis holographic dark energy (THDE) model with quintessence in a homogeneous and anisotropic Bianchi type-III (B-III) space-time. We construct the model by using two conditions (i) expansion scalar ($θ$) is proportionate to shear scalar ($σ$) in the model and (ii) hybrid expansion law $a = t^βe^{γt}$, where $β>0$, $γ>0$. Our study is based o… ▽ More

    Submitted 11 July, 2021; originally announced August 2021.

    Comments: 20 pages, 9 figures

  7. Barrow agegraphic dark energy

    Authors: Umesh Kumar Sharma, Gunjan Varshney, Vipin Chandra Dubey

    Abstract: In this work, we propose a new dark energy model by applying the Barrow entropy and the holographic principle, with a time scale as IR cut off. Analysing the conformal time as well as universe's age as infrared cut-offs, we explore the cosmological importance of the suggested dark energy models and examine the universe evolution filled with the proposed DE applicants and a pressure-less matter. We… ▽ More

    Submitted 24 December, 2020; originally announced December 2020.

  8. arXiv:2007.09409  [pdf, other

    cs.CR

    A Comprehensive Survey of Aadhar and Security Issues

    Authors: Isha Pali, Lisa Krishania, Divya Chadha, Asmita Kandar, Gaurav Varshney, Sneha Shukla

    Abstract: The concept of Aadhaar came with the need for a unique identity for every individual. To implement this, the Indian government created the authority UIDAI to distribute and generate user identities for every individual based on their demographic and biometric data. After the implementation, came the security issues and challenges of Aadhaar and its authentication. So, our study focuses on the jour… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.

  9. arXiv:1901.06245  [pdf, other

    cs.CY

    Understanding the Social Factors Affecting the Cryptocurrency Market

    Authors: Gourang Aggarwal, Vimal Patel, Gaurav Varshney, Kimberly Oostman

    Abstract: Blockchain and its application on cryptocurrency transactions have gathered a lot of attention and popularity since the birth of the pioneer Bitcoin in 2009. More than 1500 cryptocurrencies are currently circulated in the market. The technology underpinning Bitcoin and other cryptocurrencies is Blockchain and is a rapidly growing decentralized distributed ledger technology which find its major inv… ▽ More

    Submitted 13 January, 2019; originally announced January 2019.

    Comments: Presented in ICITST 2018, London

  10. arXiv:1804.04274  [pdf, other

    cs.CR

    A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet

    Authors: Gaurav Varshney, Pawel Szalachowski

    Abstract: Domain Name System (DNS) domains became Internet-level identifiers for entities (like companies, organizations, or individuals) hosting services and sharing resources over the Internet. Domains can specify a set of security policies (such as, email and trust security policies) that should be followed by clients while accessing the resources or services represented by them. Unfortunately, in the cu… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

    Comments: SecureComm'18