Publication

Recent Publication

  • Mehdi Bahrami, Mukesh Singhal, Wei-Peng Chen, "Learning Data Privacy and Terms of Service from Different Cloud Service Providers", IEEE International Conference on Smart Cloud (IEEE SmartCloud 2017), Columbia University, New York, USA ( Download PDF)
  • Mehdi Bahrami, Abhishek Malvankary, Karan K. Budhraja, Chinmay Kundu, Ashish Kundu, Mukesh Singhal, "Compliance-Aware Provisioning of Containers on Cloud",10th IEEE International Conference on Cloud Computing (IEEE CLOUD 2017), Honolulu, Hawaii, USA ( Download PDF)
  • Karan K. Budhraja, Abhishek Malvankary, Mehdi Bahrami, Chinmay Kundu, Ashish Kundu, Mukesh Singhal, "Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN",10th IEEE International Conference on Cloud Computing (IEEE CLOUD 2017), Honolulu, Hawaii, USA ( Download PDF)
  • Bahrami, Mehdi. (2016). A Dynamic Cloud with Data Privacy Preservation. UC Merced: Electrical Engineering and Computer Science. Retrieved from:http://escholarship.org/uc/item/03g6171c  ( Download PDF Endnote ).
  • Mehdi Bahrami and Mukesh Singhal, "DCCSOA: A Dynamic Cloud Computing Service-Oriented Architecture" in 16th IEEE International Conference on InformationReuse and Integration (IEEE IRI 2015), Aug 13-17, San Francisco, IEEE, 2015. (Acceptance Rate: 25.6%) ( Download PDF)
  • Mehdi Bahrami and Mukesh Singhal, "A Light-Weight Permutation based Method for Data Privacy in Mobile Cloud Computing" in 2015 3rd Int. Conf. 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2015) San Francisco, IEEE, 2015. ( Download PDF)
  • Santosh Chandrasekhar and Mukesh Singhal, "An Efficient and Scalable Authenticated Cloud Storage Scheme Based on Trapdoor Hash Functions", Technical Paper, University of California, Merced, Jan 13, 2015.  Download PDF
  • Mehdi Bahrami, Mukesh Singhal and Zixuan Zhuang, "A Cloud-based Web Crawler Architecture" in 2015 18th Int. Conf. Intelligence in Next Generation Networks: Innovations in Services, Networks and Clouds (ICIN 2015), Paris, France, IEEE, 2015. ( Download PDF)
  • Mehdi Bahrami and Mukesh Singhal, “The Role of Cloud Computing Architecture in Big Data”, Information Granularity, Big Data, and Computational Intelligence, Vol. 8, Chapter 13, Pedrycz and S.-M. Chen (eds.), Springer, 2014.( Download Chapter (PDF) | Download Book)
 

Books

“Distributed Computing: Principles, Algorithms and Systems,” by M. Singhal and A.D. Kshemkalyani, Cambridge University​ Press, UK, 2008, 750 pages

“Advanced Concepts in Operating Systems: Distributed, Database, and Multiprocessor Operating Systems,” by M. Singhal and N. Shivaratri, McGraw-Hill Publishing Company, New York, 1994, 525 pages

“Data and Computer Communications: Networking and Internet Working,” by G.S Hura and M. Singhal, CRC Press, Boca Raton, Fla., (ISBN: 0-8493-0928-X), 2001, 1,169 pages

“Advanced Readings in Distributed Computing Systems,” by Thomas Casavant and Mukesh Singhal (editors), IEEE Computer Society Press, 1993, 618 pages

Book chapters

  •  Mehdi Bahrami and Mukesh Singhal, “The Role of Cloud Computing Architecture in Big Data”, Information Granularity, Big Data, and Computational Intelligence, Vol. 8, Chapter 13, Pedrycz and S.-M. Chen (eds.), Springer, 2014 Download Chapter (PDF) | Download Book
  • “Authentication in Wireless Networks” by Saikat Chakrabarti, Venkata Giruka and M. Singhal, in “Security in Distributed, Grid, Mobile and Pervasive Computing,” (edited by Professor Yang Xiao), Auerbach Publications, CRC Press 2007, pages 87-110
  • “Key Management and Agreement in Distributed Systems” by Venkata Giruka, Saikat Chakrabarti and M. Singhal, in “Security in Distributed, Grid, Mobile and Pervasive Computing,” (edited by Professor Yang Xiao), Auerbach Publications, CRC Press 2007, pages 23-52
  • “Secure Routing in Wireless Ad Hoc Networks" by Venkata Giruka and M. Singhal, in "Wireless/Mobile Network Security," (edited by Yang Xiao, Xuemin (Sherman) Shen and Ding-zhu Du), Springer, 2006
  • “Mutual Exclusion" by M. Singhal, in "Encyclopedia of Distributed Computing," Kluwer Academic Publishers (in press)
  • “Computer Networks” by Ajay D. Kshemkalyani and Mukesh Singhal, in "Encyclopedia of Electrical and Electronics Engineering," John Wiley, Vol. 4, pages 24-43, 1999
  • “Distributed Computing” by Mukesh Singhal, in "Encyclopedia of Computers," Vol. 1, pages 316-320, Macmillan Publishing Co., New York, 1992
  • “Analysis of Transaction Blocking in Arbitrary Data Access Distribution in Database Systems” by Mukesh Singhal and Yelena Yesha, in "Computer Performance and Reliability," North-Holland 1988 (editors: Lazeolla, Courtois and Boxama)

Refereed journal publications

  • “A Pre-Processed Cross Link Detection Protocol for Geographic Routing in Mobile Ad Hoc and Sensor Networks Under Realistic Environments with Obstacles,” by Yan Sun, Qiangfeng JiaQ and Mukesh Singhal, to appear in Journal of Parallel and Distributed Computing

  • “Efficient Proxy Signatures Based on Trapdoor Hash Functions,” by Santosh Chandrasekhar, Saikat Chakrabarti, Mukesh Singhal and Kenneth L. Calvert, IET Information Security (special issue on multi-agent and distributed information security), Vol. 4, Issue 4, December 2010, pages 322-332

  • “An Edge Constrained Localized Delaunay Graph for Geographic Routing in Mobile Ad Hoc and Sensor Networks," by Yan Sun, Qiangfeng Jiang and Mukesh Singhal, IEEE Transactions on Mobile Computing, Vol 9, No. 4, April 2010, pages 479-490

  • “An Efficient and Scalable Quasi-Aggregate Signature Scheme Based on LFSR Sequences,” by Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal and Kenneth L. Calvert, IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 7, July 2009, pages 1059-1072

  • “An Escrow-less Identity-Based Group Key Agreement Protocol for Dynamic Peer Groups,” by Saikat Chakrabarti, Santosh Chandrasekhar and Mukesh Singhal, International Journal of Security and Networks (IJSN), Vol. 4 (3), July 2009, pages 171-188

  • “A Light-Weight Scalable Truthful Routing Protocol in MANETs with Selfish Nodes,” by Yongwei Wang and Mukesh Singhal, International Journal of Ad Hoc and Ubiquitous Computing, Vol. 4, Issue 3/4, 2009, pages 210-222

  • “ARPC: Anchor-Based Routing Protocol for Mobile Ad Hoc Networks With Cell ID Management System,” by Huaizhi Li and Mukesh Singhal, International Journal of Ad Hoc and Sensor Wireless Networks, 3 (2-3): 197-218, 2008

  • “Enhancing Performance by Salvaging Route Reply Messages in On-Demand Routing Protocols for MANETs,” by Rendong Bai, Mukesh Singhal and Y. Luo, Journal of Ad Hoc and Sensor Wireless Networks, Vol. 5, No. 3-4, 2008, pages 161-188

  • “A Quasi-Synchronous Checkpointing Algorithm that Prevents Contention for Stable Storage,” by D. Manivannan, Q. Jiang, J. Yang and M. Singhal, Information Sciences, 178 (15):3109- 3116, August 2008, Elsevier

  • “Truthful Multipath Routing for Ad-Hoc Networks with Selfish Nodes,” by Yongwei Wang, Venkata Giruka and Mukesh Singhal, Journal of Parallel and Distributed Computing, Vol. 68, Issue 6, June 2008, pages 778-789

  • “RPSF: A Routing Protocol with Selective Forwarding for Mobile Ad-Hoc Networks,” by D. Manivannan, R. Finkel and Mukesh Singhal, Wireless Personal Communications, Springer, Vol. 43, No. 2, October 2007, pages 411-436

  • “On Improving the Efficiency of Truthful Routing in MANETs with Selfish Nodes,” by Yongwei Wang and Mukesh Singhal, Pervasive and Mobile Computing, Elsevier, Vol. 3, No. 5, October 2007, pages 537-559

  • “On Supporting High-Throughput Routing Metrics in On-Demand Routing Protocols for Multi-Hop Wireless Networks,” by Rendong Bai, Mukesh Singhal and Yongwei Wang, Journal of Parallel and Distributed Computing, Vol. 67, No. 10, October 2007, pages 1108-1118

  • “A Self-Healing On-Demand Geographic Path-Based Routing Protocol for Mobile Ad Hoc Networks,” by Venkata C. Giruka and Mukesh Singhal, Ad Hoc Networks, Elsevier, Vol. 5, Issue 7, September 2007, pages 1113-1128

  • “ABRP: Anchor-BRouting Protocol for Mobile Ad Hoc Networks,” by Huaizhi Li and Mukesh Singhal, Wireless Personal Communications, Springer, 2007, Vol. 42, pages 277-300

  • “Password-Based Authentication: Preventing Dictionary Attacks,” by Saikat Chakrabarti and Mukesh Singhal, IEEE Computer, Vol. 40., No. 6, June 2007, pages 68-74

  • “An Efficient Algorithm for Detecting Locally Stable Predicate in a Distributed Computation,” by R. Atreya, N. Mittal, A. Kshemkalyani, V. Garg and M. Singhal, Journal of Parallel and Distributed Computing, No. 67, April 2007, pages 369-385

  • “A Truthful Geographical Forwarding Algorithm for Ad Hoc Networks with Selfish Nodes,” by Yongwei Wang, Venkata C. Giruka and Mukesh Singhal, International Journal on Networks Security, Vol. 5, No. 3, 2007, pages 252-263

  • “Trust Management in Distributed Systems,” by Huaizhi Li and Mukesh Singhal, IEEE Computer, Vol 40, No. 2, February 2007, pages 45-53

  • “DOA: DSR Over AODV routing for Mobile Ad Hoc Networks,” by Rendong Bai and Mukesh Singhal, IEEE Transactions on Mobile Computing, Vol. 8, No. 10, October 2006, pages 1403- 1416

  • “Location Service Protocols for Wireless Ad Hoc Networks,” by Venkata Giruka and Mukesh Singhal, Pervasive and Mobile Computing, Elsevier, Vol. 2, Issue 3, September 2006, pages 262-285

  • “Security in Wireless Sensor Networks,” by V. Giruka, M. Singhal, J. Royalty and S. Varanasi, Wireless Communications and Mobile Computing, Wiley InterScience, 2006, No. 6, pages 1-24