Eng. Lt. Col. Dr. C. D. Gamage

Contact information

Address

Department of Computer Science & Engineering

Faculty of Engineering

University of Moratuwa

Moratuwa

10400

Office
Extension
3100
Residence
Mobile
Primary Email
chandag@cse.mrt.ac.lk

Teaching and Administrative Activities

Teaching

Undergraduate Teaching (S1 to S8)

S2 CS2222 Principles of Embedded Systems Programming
S3 CS2242 Embedded Software Development
S4 CS3252 Industrial Computer Engineering
S5 CS3052 Computer Security
S7 CS4232 Formal Methods in Software Engineering
S8 CS4452 Information Security & Cryptography

Postgraduate Teaching (S1 to S6)

S1 CS5424CE Cryptography Engineering
S2 CS5461NS Network Security
S3 CS5313FTC Fault Tolerant Computing
S4 CS5462ESS Embedded Systems Security
S2 CS5192 Skills for Research Project (MBA-IT)
S3 CS5102 IT Policy and Planning

Administrative Activities
Undergraduate Semester Coordinator for S2, S3, S7 and S8
Postgraduate Course Coordinator for MBA-IT
Faculty of Graduate Studies Board Member nominee from Faculty of Engineering
Convener of Exhibition Committee of the Faculty of Engineering

Research Activities

Key Research Areas
Mobile Ad-hoc Network Control & Routing
Dynamic Head-pose Estimation for AR Applications
Security Evaluation of Composed Software Systems

Education and Training

Education
PhD (Monash)
MEng (AIT)
BSc Eng Hons (Moratuwa)
Training / Work Experience
Peninsular School of Computing & Information Technology, Monash University, Australia
Facultiet Exacte Wiskunde, Vrije Universiteit, Amsterdam
Corps of Signal, Sri Lanka Army

Career

Professional Affiliations
MIE(SL), CEng
MACM
Positions Held
Former Head of the Department of Computer Science & Engineering (2011-2014)
Professional Assignments
Project Coordinator, EMIS Project of the Ministry of Education
Project Advisor, STOMD/SDOMD Project of the Police Department
Professional Activities
Faculty Advisor of the ACM Student Chapter, University of Moratuwa
Council Member of the IESL, Session 2016/2017

Honours and Awards

Honours and Awards
Research Excellence Award, University of Moratuwa

Publications*

Publications
  • Samaranayake, V. and Gamage, C. D., “Employee perception towards electronic monitoring at work place and its impact on job satisfaction of software professionals in Sri Lanka”, Journal of Telematics and Informatics, 29 (2012) 233-244, Available online 24 August 2011.
  • Sandaruwan, H. G. L., Kumara, G. D. T., Dileepa, H. G. R., Gunaratna, H. D., and Gamage, C., “Innovative framework for human motion tracking for HCI”, In Proceedings of the CS&ES Conference 2011, pages 87-92, November 2011.
  • Sharma, K. and Gamage, C., “Security issues of virtual machine residues”, In Proceedings of the 17th Annual Research Symposium,  Faculty of Engineering, University of Moratuwa, pages 186-188, December 2011.
  • Srijeyanthan, K., Thusyanthan, A., Joseph, C. N., Kokulakumaran, S., Gunasekara, C., and Gamage C.Skeletonization in a Real-time Gesture Recognition System, In Proceedings of the Fifth International Conference on Information and Automation for Sustainability (ICIAfS 2010), pages 213-218, Colombo, Sri Lanka, December 2010. IEEE Computer Society (ISBN: 978-1-4244-8550-5)
  • Ranmuthugala, M. H. P. and Gamage, C.Chaos Theory based Cryptography in Digital Image Distribution, In Proceedings of the 2010 International Conference on Advances in ICT for Emerging Regions (ICTer), pages 32-39, Colombo, Sri Lanka, September 2010. IEEE Computer Society (ISBN: 978-1-4244-9041-7)
  • Hettiarachchi, R. and Gamage, C.Countering Ambiguity Attacks Against Digital Image Watermarking Schemes, In Proceedings of the 2010 CS&ES Conference (CSES 2010), pages 17-22, Moratuwa, Sri Lanka, September 2010 (ISBN: 978-955-9027-37-9)
  • Kumara, I. and Gamage, C.Towards Reusing ESB Services in Different ESB Architectures, In Lin, X. and Yang, H., editors, Proceedings of the 34th Annual IEEE Software and Applications Conference (COMPSAC 2010) - Fourth IEEE International Workshop on Quality Oriented Reuse of Software (QUORS 2010), pages 25-30, Seoul, South Korea, July 2010 (ISBN: 978-0-7695-4105-1)
  • Joseph C. N., Kokulakumaran S., Srijeyanthan K., Thusyanthan A., Gunasekara C., and Gamage C. D.A Framework for Whole-Body Gesture Recognition from Video Feeds, In Proceedings of the Fifth IEEE International Conference on Industrial and Information Systems (ICIIS 2010), , Karnatak, India, July 2010 (in print)
  • Dayananda, K.S., Amarawardhana, C., Porawagama, H., and Gamage, C.:, A Case Study of WSN as a Replacement for SCADA, In Proceedings of the Fourth IEEE International Conference on industrial and Information Systems (ICIIS 2009), pp. CIE2-4, Peradeniya, Sri Lanka, December 2009 (ISBN: 978-142-4448-37-1)
  • Malalasena, B. A., Nimalaprakasan, S., Ramanan, S., Shayanthan, K., Gamage, C., and Fernando, M. S. D.: Privacy Enhanced Data Management for an Electronic Identity System. In Proceedings of the 2009 Conference on Innovative Technologies in Intelligent Systems & Industrial Applications (CITISIA 2009), pages 358-363, Kuala Lumpur, Malaysia, July 2009. (ISBN: 978-1-4244-2886-1)
  • Malalasena, B. A., Nimalaprakasan, S., Ramanan, S., Shayanthan, K., Gamage, C., and Fernando, M. S. D.: Versatile Privacy Preserving Electronic Identity Framework. In Nanayakkara, V. and Gunasinghe, U. P., editors, Proceedings of the 2009 CS&ES Conference (CSES 2009), pages 133-140, Colombo, Sri Lanka, July 2009. (ISBN 9-78-955-9027-32-4).
  • Jesi, G. -P., Gavidia, D., Gamage, C., and van Steen, M.: A Secure Peer Sampling Service. In Proceedings of the Fourth IEEE International Conference on Autonomic Computing, Jacksonville, Florida, USA, June 2007. IEEE Computer Society.
  • Gavidia, D., van Steen, M., Gamage, C., and Jesi, G. -P,: Canning Spam in Wireless Gossip Networks. In Proceedings of the Fourth IEEE Conference on Wireless on Demand Network Systems and Services (WONS'07), pages 30-37, Obergurgl, Tyrol, Austria, January 2007. IEEE Computer Society (ISBN 1-42440-860-1).
  • Tanenbaum, A. S., Gamage, C., and Crispo, B.: Taking Sensor Networks from the Lab to the Jungle. In IEEE Computer, volume 39, number 8, pages 98-100, August 2006. (ISSN 0018-9162)
  • Gamage, C., Gras, B., Crispo, B., and Tanenbaum, A. S.: An Identity-based Ring Signature Scheme with Enhanced Privacy. In Kent, S., and Tsudik, G., editors, Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006), pages 1-5, Baltimore, Maryland, USA, August 2006. IEEE Communications Society (ISBN: 1-42440-423-1).
  • Gamage, C., Bicakci, K., Crispo, B., and Tanenbaum, A. S.: Security for the Mythical Air-dropped Sensor Network. In Bellavista, P. Chen, C.-M., Corradi, A., and Daneshmand, M., editors, Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), pages 41-47, Cagliari, Sardinia, Italy, June 2006. IEEE Computer Society (ISBN 0-76952-588-1).
  • Nair, S. K., Gamage, C., Crispo, B., and Tanenbaum, A. S.: Countering Digital Forensics. In Lelieveldt, B., Haverkort, B., and de Laat, C., editors, ASCI 2006, Proceedings of the 12th Annual Conference of the Advanced School for Computing and Imaging, Lommel, Belgium, June 2006.
  • Gamage, C., Leiwo, J., Bicakci, K., Crispo, B., and Tanenbaum, A. S.: A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks. In Palaniswami, M., editor, Proceedings of the Second International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2005), pages 45-50, Melbourne, Australia, December 2005. IEEE Computer Society (ISBN 0-78039-399-6).
  • Nair, S. K., Popescu, B. C., Gamage, C., Crispo, B., and Tanenbaum, A. S.: Enabling DRM-Preserving Digital Content Redistribution. In Müller, G. and Lin, K.-J., editors, Proceedings of the Seventh IEEE International Conference on E-Commerce Technology (CEC 2005), pages 151-158, München, Germany, July 2005. IEEE Computer Society (ISBN 0-76952-277-7).
  • Bicakci, K., Gamage, C., Crispo, B., and Tanenbaum, A. S.: One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks, In Molva, R., Tsudik, G., and Westhoff D., editors, Proceedings of the Second European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2005), volume 3813 of Lecture Notes in Computer Science, pages 80-90, Visegrad, Hungary, July 2005. Springer-Verlag (ISBN 3-54030-912-8),
  • Popescu, B. C., Gamage, C., and Tanenbaum, A.S.: Access Control, Reverse Access Control and Replication Control in a World Wide Distributed System. In Jerman-Blazic, B., and Klobucar, T., editors, Advanced Communications and Multimedia Security, Proceedings of theSixth Conference on Communications and Multimedia Security (CMS’02), volume 228 of International Federation for Information Processing (IFIP), pages 155-167, Portoroz, Slovenia, September 2002. Kluwer Academic Publishers (ISBN 1-402-07206-6).
  • Gamage, C., Leiwo, J., and Tanenbaum, A.S.: A Personalized Digital Watermarking Protocol for Secure Online Content Distribution. In Lagendijk, R. L., Heijnsdijk, J. W. J., Pimentel, A. D., and Wilkinson, M. H. F., editors, ASCI 2001, Proceedings of theSeventh Annual Conference of the Advanced School for Computing and Imaging, pages 476-483, Heijen, The Netherlands, May 2001. ASCI (ISBN 9-080-30866-8).
  • Mihailescu, P., Gamage, C., and Kendall, E. A.: Mobile Agent to User Interaction (MAUI). In Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), volume 8, pages 8032, Maui, Hawaii, January 2001. IEEE Computer Society (ISBN 0-769-50981-9).
  • Gamage, C., Leiwo, J., and Zheng, Y.: High Performance Agile Crypto Modules. In Dawson, E., Clark, A., and Boyd, C., editors, Information Security and Privacy, Proceedings of the Fifth Australasian Conference (ACISP 2000), volume 1841 of Lecture Notes in Computer Science, pages 74-88, Brisbane, QLD, Australia, July 2000. Springer-Verlag (ISBN 3-540-67742-9).
  • Mihailescu, P., Gamage, C., and Zheng, Y.: APE: An Agent Portal for Secure E-commerce with Wireless Internet Access by PDA. In Proceedings of the Evolve 2000 Conference, Sydney, Australia, February 2000. Cooperative Research Center for Enterprise Distributed Systems Technology (CRC-DSTC).
  • Leiwo, J., Hanle, C., Homburg, P., Gamage, C., and Tanenbaum, A. S.: A Security Design for a Wide-Area Distributed System. In Song, J. S., editor, Information Security and Cryptology, Proceedings of the Second International Conference (ICISC'99), volume 1787 of Lecture Notes in Computer Science, pages 236-256, Seoul, Korea, December 1999. Springer-Verlag (ISBN 3-540-67380-6).
  • Gamage, C., Leiwo, J., and Zheng, Y.: Why Hierarchical Key Distribution is Appropriate for Multicast Networks. In Song, J. S., editor, Information Security and Cryptology, Proceedings of the Second International Conference (ICISC'99), volume 1787 of Lecture Notes in Computer Science, pages 120-131, Seoul, Korea, December 1999. Springer-Verlag (ISBN 3-540-67380-6).
  • Mihailescu, P., Dospisil, J., Gamage, C., and Zheng, Y.: Mobile Agents in a Virtual Market. In Cooper, J. and Burgess, L., editors, Proceedings of the Third Annual Collaborative Electronic Commerce Technology and Research Conference (COLLECTER'99), Wellington, New Zealand, November 1999. (ISBN 0-86418-609-6).
  • Gamage, C., Leiwo, J., and Zheng, Y.: Timestamps for Network Authentication Protocols Revisited. In Yngström, L. and Svensson, T., editors, Proceedings of the Fourth Nordic Workshop on Secure IT Systems (NORDSEC'99), pages 269-289, Stockholm, Sweden, November 1999. Department of Computer and Systems Sciences, Stockholm University/Royal Institute of Technology (ISBN 9-17153-955-7).
  • Leiwo, J., Gamage, C., and Zheng, Y.: Organizational Modeling for Efficient Specification of Information Security Requirements. In Eder, J., Rozman, I. and Welzer, T., editors, Advances in Databases and Information Systems, Proceedings of the Third East European Conference (ADBIS'99), volume 1691 of Lecture Notes in Computer Science, pages 247-260, Maribor, Slovenia, September 1999. Springer-Verlag (ISBN 3-54066-485-8).
  • Gamage, C., Leiwo, J., and Zheng, Y.: Encrypted Message Authentication by Firewalls. In Imai, H. and Zheng, Y., editors, Public Key Cryptography, Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography (PKC'99), volume 1560 of Lecture Notes in Computer Science, pages 69-81, Kamakura, Japan, March 1999. Springer-Verlag (ISBN 3-54065-644-8).
  • Gamage, C., Leiwo, J., and Zheng, Y.: An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption. In Edwards, J., editor, Computer Science'99, Proceedings of the 22nd Australasian Computer Science Conference (ACSC'99), volume 21, number 1 of Australian Computer Science Communications, pages 420-431, Auckland, New Zealand, January 1999. Springer-Verlag (ISBN 9-81402-154-7).
  • Gamage, C., Leiwo, J., and Zheng, Y.: A Block-Based Approach to Secure ATM Networking. In Proceedings of the 1998 International Computer Symposium (ICS'98) Workshop on Cryptology and Information Security, pages 41-48, Tainan, Taiwan, December 1998. National Cheng Kung University (ISBN 9-57884-511-1).
  • Leiwo, J., Gamage, C., and Zheng, Y.: A Model for Assurance of External Properties of Information Security Requirement Bases. In Proceedings of the 1998 International Computer Symposium (ICS'98) Workshop on Cryptology and Information Security, pages 124-131, Tainan, Taiwan, December 1998. National Cheng Kung University (ISBN 9-57884-511-1).
  • Gamage, C., Leiwo, J., and Zheng, Y.: Fast Batch Verification of Schnorr Signatures. In Knapskog, S. J. and Brekne, T., editors, Proceedings of the Third Nordic Workshop on Secure IT Systems (NORDSEC'98), Trondheim, Norway, November 1998. Department of Telematics, NTNU (ISBN 8-29939-801-0).
  • Leiwo, J., Gamage, C., and Zheng, Y.: Harmonizer - A Tool for Processing Information Security Requirements in Organizations. In Knapskog, S. J. and Brekne, T., editors, Proceedings of the Third Nordic Workshop on Secure IT Systems (NORDSEC'98), Trondheim, Norway, November 1998. Department of Telematics, NTNU (ISBN 8-29939-801-0).
  • Leiwo, J., Gamage, C., and Zheng, Y.: An Object-Oriented Modeling Approach into the Management of Information Security. In Papp, G. and Posch, R., editors, Global IT-Security, Proceedings of the IFIP TC11 14th International Conference on Information Systems Security (IFIP/Sec'98), pages 575-579, Vienna, Austria and Budapest, Hungary, August-September 1998. Austrian Computer Society (ISBN 3-85403-116-5).
  • Leiwo, J., Gamage, C., and Zheng, Y.: A Mandatory Access Control Policy Model for Information Security Requirements. In McDonald, C., editor, Computer Science'98, Proceedings of the 21st Australasian Computer Science Conference (ACSC'98), volume 20, number 1 of Australian Computer Science Communications, pages 527-538, Perth, WA, Australia, February 1998. Springer-Verlag (ISBN 9-81308-390-5).
  • Gamage, C., Leiwo, J., and Zheng, Y.: Building Secure High Speed Extranets. In Karila, A. and Aalto, T., editors, Proceedings of theSecond Nordic Workshop on Secure Computer Systems (NORDSEC'97), Helsinki, Finland, November 1997. Helsinki University of Technology (ISBN 9-51223-783-0).
  • Gamage, C., Leiwo, J., and Zheng, Y.: ATM Cell Based Security Implementation. In Proceedings of the Second New Zealand ATM and Broadband Workshop (ATMWORKS'97), pages 67-82, Hamilton, New Zealand, February 1997. The University of Waikato.
  • Gamage, C., Kanchanasut, K., and Pallewatta, M.: Domain Name Services for Dynamic Hosts. In Proceedings of the Post-conference Workshop on Computer Networking: Putting Theory to Practice, 1995 Asian Computing Science Conference (AsianCSC'95), pages 20-30, Bangkok, Thailand, December 1995. Asian Institute of Technology.
  • Gamage, C.and Kanchanasut, K.: IP Addresses for Low Bandwidth Networks. In Proceedings of the XIV Conference of South East Asia Regional Computer Confederation (SEARCC'95), pages 646-658, Colombo, Sri Lanka, September 1995. Computer Society of Sri Lanka (ISBN 9-55915-503-2).

Other Details