« Go Back

Dr. Anita John
Ph.D., M.Tech. Computer Science, B.Tech(CS)
Asst Professor
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

Dr. Anita John works in the domain of Cryptography and Information Security. She received her Ph.D. from National Institute of Technology Calicut (NIT Calicut) in 2024. Her doctoral thesis, titled "Design and Analysis of Stream Ciphers and Hash Functions using Higher Radii Cellular Automata," focused on the design of new cryptographic primitives using Cellular Automata. She also holds an M.Tech degree in Computer Science and Engineering with a specialization in Information Security from NIT Calicut (2006-2008) and B.Tech Degree in Computer Science and Engineering from CUSAT (2000-2004).

Anita has been involved in teaching various undergraduate and postgraduate courses since 2004. She began her career at Mar Baselios College of Engineering and Technology, Thiruvananthapuram in 2004. In 2009, she joined Rajagiri School of Engineering and Technology, Cochin.

Her research interests are diverse and include areas of cryptography and information security. She has made significant contributions to these fields through her research, publications, and presentations at conferences. She has published several research papers in international journals and presented her work at various international conferences.

For academic inquiries, collaborations, or consultations, she can be reached through her official email at RSET.

Courses Taught

Dr. Anita has taught a variety of courses, including but not limited to:

Undergraduate courses

Foundations of Security in Computing

Cryptography and Network Security

Algorithm Analysis and Design

Data Structures and Algorithms

Operating Systems

Postgraduate Courses

Computer Security and Applied Cryptography

Foundations of Information Security


RSET Unique Id: 31542
Area of Interest: Information Security
Email anitaj@rajagiritech.edu.in
Website people.rajagiritech.ac.in/anitaj
PUBLICATION-CONFERENCE/JOURNAL DETAILS
Year Title of the Paper-Conference/Journal Details
2023 Hash Function Design Based on Hybrid Five Neighbourhood Cellular Automata and Sponge Functions
Complex Systems
2022 Fault Resistant Trivium-like Stream Cipher Using Higher Radii Cellular Automata.
Journal of Cellular Automata
2022 A Cellular Automata Based Fault Resistant MICKEY-Like Stream Cipher
15th International Conference on Cellular Automata for Research and Industry, ACRI 2022, Geneva, Switzerland
2021 A Novel Hash Function Based on Hybrid Cellular Automata and Sponge Functions
First Asian Symposium on Cellular Automata Technology
2020 A Novel Hash Function Based on Hybrid Cellular Automata and Sponge Functions.
First Asian Symposium on Cellular Automata Technology. ASCAT 2022
2020 PENTAVIUM: Potent Trivium-Like Stream Cipher Using Higher Radii Cellular Automata.
The 14th International Conference and School Cellular Automata for Research and Industry. Univerity of Lodz, Poland
2018 CARPenter:A Cellular Automata Based Resilient Pentavalent Stream Cipher.
Cellular Automata-13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy
2014 Merin Silvi, Anita John: A Short Survey On Image Steganography Techniques in Spatial Domain, Proceedings of the National Conference on Information Security and Network Engineering-(NCISN)
2013 Expository Study on Sybil attack counter measures in VANET”
2012 Survey on data mining techniques to enhance intrusion detection
2012 International Conference on Computer Communication and Informatics
2012 Host based attack detection using system calls
Second International Conference on Computational Science, Engineering and Information Technology (CCSEIT '12).
2012 Improving Lifetime of Structured Deployed Wireless Sensor Network Using Sleepy Algorithm
International Conference on Eco-friendly Computing and Communication Systems
2011 Rootkit detection mechanism: A survey
International Conference on Parallel Distributed Computing Technologies and Applications, pp. 366-374. Springer, Berlin, Heidelberg, 2011.
2011 A host based kernel level rootkit detection mechanism using clustering technique.
International Conference on Computational Science, Engineering and Information Technology