Books : “Data Structures and Algorithms” with ISBN 978-93-8590-88-0 distributed by Wiley, dreamtech press.
Books : “A text book on Discrete Mathematics” with ISBN 978-93-86872-76-7 distributed by Wiley, dreamtech press.
Patent: DSD-PREDICT GENDER, AGE, COUNTRY AND MEANING: DETECT SOUND AND THEIR GENDER, AGE, COUNTRY AND MEANING USING DEEP LERNING.
Application Number: 202041053285, Publication Date (U/S 11A): 25/12/2020
“Algorithmic Comparison between polynomial base and Matrix based NTRU cryptosystem”, International Journal of Computer and Network Security (IJCNS) Vol.2, No.7,July 2010.(ISSN Print:2076-2739, ISSN Online: 2076-9199).
“NTRU Digital Signature Scheme - A Matrix Approach”, International Journal of Advanced Research in Computer Science (IJARCS) Volume II issue I, Feb. 2011. (ISSN 0976 - 5697)
“Dependent Private Key Generation in NTRU Cryptosystems”, International Journal of Computer Applications (IJCA) Special Issue on “Network Security and Cryptography” NSC, 2011. (ISBN: 978-93-80865-68-5).
“Analysis and Performance Characteristics of Cryptosystem using Image Files”, International Journal of Computer Applications (IJCA) Volume 51– No.22, August 2012 (0975 – 8887).
"Dual Encryption Schema With Cheating Text and NTRU" International Journal of Computer Trends and Technology (IJCTT)- volume4 Issue2- 2013, ISSN: 2231-2803,pp: 169-171.
"An NTRU Scheme for Secure Transaction in Grid Implementation", International Journal of Emerging Technology and Advanced Engineering(IJETAE), ISSN 2250-2459,Volume 3, Issue 2, February, 2013 pp: 648-652
"Secure Mobile System Using NTRU Encrypt", International Journal of Computer Trends and Technology (IJCTT)- volume4 Issue2- 2013,ISSN: 2231-2803,pp:172-176.
"Spectral Flatness Measurements for Detection of C-Worms", International Journal of Computer Trends and Technology (IJCTT)- volume4 Issue2- 2013,ISSN: 2231-2803,pp: 189-193.
“Performance and analysis of NTRU and Advanced NTRU cryptosystems”, International Journal of Research in Computer and Communication Technology, Vol 2 Issue 8, August -2013, ISSN(Online) 2278-5841, ISSN (Print) 2320-5156, PP 627-632.
“Avalanche Effect and Statistical Analysis of NTRU & RSA Cryptosystem”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCS&SE) Vol 3, Issue 8, August 2013, ISSN: 2277 128X, PP 416-422.
“Integrated Data Mining Approach for Security Alert System” International Journal of Research in Computer and Communication Technology (IJRCCT) Vol 3 No 4, April 2014, PP 464-468 (ISSN Online:2278-5841 ISSN Print:2320-5156).
“Predictive Collective Behavior in Social Media Network Using Edge Centric Clustering”, International Journal of Research in Computer and Communication Technology (IJRCCT), Vol 3, Issue 10, October – 2014,pp 1225-1230.
“An Obfuscation threshold as part of the Access policy in processing systems”, International Journal of Research in Computer and Communication Technology (IJRCCT), Vol 3, Issue 11, Nov – 2014,pp: 1653-1660.
“Decentralized Probabilistic Text Clustering by using Distributed Hierarchical peer to peer Clustering”, International Journal of Research in Computer and Communication Technology (IJRCCT), Vol 3, Issue 11, Nov – 2014,pp 1661- 1665.
“Analysis of Rabin and RSA Cryptosystems Using Bit Shifting and Stuffing (BSS) Technique”, International Journal of Research in Computer and Communication Technology (IJRCCT), Vol 4, Issue 2, February -2015, pp 119- 124.
“NTRU with Gaussian Integer Matrix”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol 5, Issue 2, February 2015, pp 359-365.
“Analysis of Rabin and RSA Cryptosystems Using Bit Shifting and Stuffing (BSS) Technique”, International Journal of Research in Computer and Communication Technology (IJRCCT), Vol 4,Issue 2 ,February -2015, pp: 119- 124.
“A new approach on Rabin based Cryptosystem for specifying correct plain text”, International Journal of Research in Computer and Communication Technology (IJRCCT), Vol 4, Issue 5 , May -2015,pp 354-357.
“Steganography with BSS-RSA-LSB technique: A new approach to Steganography”, International Journal of Science Engineering and Advance Technology (IJSEAT) Vol. 3 Issue 5, May, 2015 pp 187-192.
“The Safety Framework in Network Security utilizing Cryptographic Systems”, International Journal of Research in Computer and Communication Technology (IJRCCT), Vol 5, Issue 1, January- 2016,pp 07-13, (ISSN Online:2278-5841 ISSN Print:2320-5156).
“Block cipher in NTRU”, International Journal of Research in Computer and Communication Technology (IJRCCT), Vol 5, Issue 1, January- 2016,pp 14-17, (ISSN Online:2278-5841 ISSN Print:2320-5156).
“Internet of things (IoT), Gives life to Nonliving”, International Journal of Research in Computer and Communication Technology (IJRCCT), Vol 5, Issue 2, February- 2016,pp 43-46, (ISSN Online:2278-5841 ISSN Print:2320-5156).
“Secure Data Retrieval for Confidential Information by External Storage Nodes in Disruption Tolerant Military Networks”, International Journal of Scientific Engineering and Technology Research (IJSETR )Volume.05, IssueNo.11, May-2016, pp: 2280-2284 (ISSN 2319-8885)
“Dynamic User Identity Verification for Secure and Transparent Using Internet Services“ , International Journal for Research on Electronics and Computer Science (IJRECS) , V-10, I-5, Jan 2017, pp: 6279- 6283 ISSN-2321-5784 (Print) ISSN-2321-5485(Online)
Rakesh Nayak, C.V.Sastry, Jayaram Pradhan, “A matrix formulation for NTRU cryptosystem” Proceedings 16th IEEE, International Conference on Networks (ICON-2008), New Delhi.
Rakesh Nayak, C.V.Sastry, Jayaram Pradhan,”NTRU Cryptosystem for block Cipher” Proceedings National Conference on Emerging Trends in Data Mining, ware housing and Computer Communication, SNIST, Hyderabad.
G. Srinivasa Rao, Md Mir Khasim, Rakesh Nayak, “Algorithm To Generate Multiple Key In NTRU Cryptosystem”,International Conference on Advances in Mathematical and Computational Methods (AMCM 2011)Sri Padmavati Mahila Visvavidyalayam, Tirupati.
Rakesh Nayak, C.V.Sastry, Jayaram Pradhan, “Reaction attacks in the Matrix Scheme of NTRU Cryptosystem”, International Conference (AIM-2011), Nagpur, published in Information Technology and Mobile Communication, Springer.
Rakesh Nayak, C.V.Sastry, Jayaram Pradhan, “Evaluation of Performance Characteristics of Polynomial based and lattice Based NTRU Cryptosystem”, Proc. of International Conference on Advances in Computer Science 2011, ACEEE International Journal on Network Security Vol-03, No-01 at Noida, India.
Rakesh Nayak, Sudam Sekhar Panda,M. Veeranjaneyulu,D. Srinivas A Mathematical Model for Perishable Resource Management, Proc. of International Conference on Contemporary Approaches In Mathematics And Emerging Engineering Trends, published in Journal of Industrial Pollution Control (Scopus Index), Page- 1505-1508 at Arupadai Veedu Institute of Technology, Tamil Nadu.
M.Ravi Sankar, Rakesh Nayak, Sudam Sekhar Panda,Web of Things: an outline, Proc. of International Conference on Innovations & Discoveries in Science, published in international journal of pure and applied mathematics(Scopus Indexed), Volume-120, Issue-6,Pages-19-32 at Engineering and Management, Vaageswari College of Engineering, Karimnagar.
R Nayak, SA Jiwani, B Rajitha Spam email detection using machine learning algorithm, Materials Today: Proceedings, April, 2021 - Elsevier
Attended CSI workshop on E-Commerce, Internet & Networking, during 7th Apr 2002 and 8th Apr 2002 at T&D Centre, RSP, Rourkela.
Attended Short term course on “Modern Mathematical Techniques for Computer Science Communication and IT” during 20 May 2002 and 31 May 2002 at IIT, Kharagpur
Attended 76th Orientation Programme, during 03rd Aug 2004 and 30th Aug 2004 at UGC Academic Staff College, Pondicherry University, Pondicherry
Attended National Workshop on “Recent trends in Object-Oriented Software Testing” during 23rd Jun 2008 and 25th Jun 2008 at NIT, Rourkela.
Attended Infosys Campus Connect “Faculty Enabled Program”, During 21st Feb 2011 and 25th Feb 2011 at Infosys Campus Connect at Vasireddy Venkatadri Institute of Technology, Guntur.
Attended One week faculty Development programme on “Network security and computer Forensics” sponsored by TEQIP-II S.C.1.2. during 30th Apr 2013 and 4th May 2013 At V R Siddhartha Engineering College, Vijayawada.
Attended Two week workshop on “ Database Management System” conducted by IIT Bombay under the national mission on education through ICT, during 21st May 2013 And 31st May 2013 At Regency Institute of Technology, Yanam
Attended MeitY, Govt. of India Sponsored FDP on “Data Analytics and IoT” organized by E&ICT Academy, Warangal during 1st Nov 2016 and 6th Nov 2016 at Sasi Institute of Technology & Engineering, Tadepalligudem
Attended FDP on Entrepreneurship Development Mi-MSME, Hyderabad during 30th Nov 2017 and 9th Dec 2017 at Vaagdevi College of Engineering
Attended National Level workshop on NAAC & NBA Accredation during 26th Jan 2020 and 27th Jan 2020 at JNTUH College of Engineering, Jagtial
Attended Online ATAL FDP on Artificial Intelligence during 11th May 2020 and 15th may 2020 online organized by IIIT Vadodara
Attended Artificial Intelligence and Machine Learning, during 18th May 2020 and 22nd may 2020 online organized by CMR Technical Campus and Blackbuck Engineering pvt. Ltd.
Attended Online ATAL FDP on Data Science, during 02nd Dec 2010 and 06th Dec 2020 organized by UCE, Kakatiya University.
Attended AICTE Sponsord One-week Online Short Term Training Programme on "Advanced Machine Learning Algorithms" during 20th Sept 2021 and 25th Sept 2021 jointly organized by AICTE, New Delhi and UGC-Human Resource Development Centre, Jawaharlal Nehru Technological University Hyderabad,Kukatpally, Hyderabad.
Delivered a talk as Resource Person in Fuzzy Logic in FDP on Artificial Intelligence AI 2020 during 21 sept 2020 and 25th sept 2020
Delivered a talk in International Conference on Computing and Technological Solutions with Artificial Intelligence during 2rd Apr 2021 and 25th Apr 2021.