- Faculty of Engineering
- Department of Computer Science & Engineering
- Professor
Contact information
Department of Computer Science & Engineering
Faculty of Engineering
University of Moratuwa
Moratuwa
10400
Teaching and Administrative Activities
Principles of Embedded Systems Programming -Undergraduate -2016
Embedded Software Development -Undergraduate -2017
Industrial Computer Engineering -Undergraduate -2016
Industrial Computer Engineering Project -Undergraduate -2017
Computer Security -Undergraduate -2017
Formal Methods in Software Engineering -Undergraduate -2016
Information Security & Cryptography -Undergraduate -2017
Automation Challenge I -Undergraduate -2016
Automation Challenge II -Undergraduate -2017
Cryptography Engineering -Postgraduate -2017
Fault Tolerant Computing -Postgraduate -2016
Network Security -Postgraduate -2017
Embedded Systems Security -Postgraduate -2016
IT Policy & Planning -Postgraduate -2016
Skills for Research Project -Postgraduate -2016
Board Member -Faculty of Engineering nominee to the Board of the Faculty of Graduate Studies ( To date)
Board Member -Member of the Postgraduate Board of Study, Faculty of Engineering (2017 To date)
Specialization Stream Coordinator - Coordinator of the Integrated Computer Engineering (ICE) Stream of Specialization in the BSc Eng Hons in Computer Science & Engineering degree offered by the Department of CSE. Responsibilities include coordination of continuous improvement of ICE specific course module content, laboratories and practicals. Also, promotion and coordination of student participation in competitions and open source projects in the areas of embedded computing, robotics, machine vision, sensor networks, etc. (2012 To 2023)
Chairman, Research Committee, University of Vocational Technology -Review, evaluation and recommendation of research publications and research projects of academic and executive staff members. (2023 To 2023)
Board Member, Faculty of IT, University of Vocational Technology - Review of academic study programs for 3 ICT degrees, review of academic procedures, and review of administrative functions for improvements. (2021 To 2023)
Research Activities
Cryptography
Computer & Network Security
Augmented & Virtual Reality
Applied cryptography, Computer security, Network security, Software security, Virtual reality, Augmented reality, Autonomous navigation systems, Mobile/multi robot systems Embedded systems, IoT
Applied cryptography, Computer security, Embedded systems
Education and Professional Affiliations
Bachelor's, University of Moratuwa ,1993 BSc Eng Hons specializing in Computer Science & Engineering
Masters, Asian Institute of Technology ,1995 MEng in Computer Science
PhD, Monash University ,2000 PhD in Computer Science
MIE(SL), CEng - Institution of Engineers, Sri Lanka (IESL)(2001 To date)
MACM - Association for Computing Machinery (ACM)(2012 To date)
Career
Honours and Awards
Research Excellence Award, University of Moratuwa (Received )
Publications*
Rathnavibhushana, A., Thamaranga, T., Kaveesha, S., and Gamage, C.,".A Social Wallet Scheme with Robust Private Key Recovery.",17th IEEE International Conference on Industrial and Information Systems (ICIIS 2023),Peradeniya, Sri Lanka,2023,1-6
Lohanathen, S., Sooriyaarachchi, S. J., and Gamage, C.,".Enhancing Trajectory Prediction of Simultaneous Collision Avoidance and Interaction Modelling Through Parameter Learning Using Machine Learning.",2023 Moratuwa Engineering Research Conference (MERCon),Moratuwa, Sri Lanka,2023,
Melaka, V., Sooriyaarachchi, S., and Gamage, C.,".Elastic ORB: Non-Rigid Transformation Based SLAM.",2022 Moratuwa Engineering Research Conference (MERCon),Moratuwa, Sri Lanka,2022,1-6
Pasqual, D. D., Sooriyaarachchi, S. J., and Gamage, C.,".Dynamic Obstacle Detection and Environmental Modelling for Agricultural Drones.",7th Asia-Pacific Conference on Intelligent Robot Systems (ACIRS 2022),Tianjin, China,2022,70-75
Kirishikesan, K., Jayakody, G., Hallawaarachchi, A., and Gamage, C.,".A High-interaction Physics-aware ICS Honeypot for Industrial Environments.",22nd International Conference on Advances in ICT for Emerging Regions (ICter 2022),Colombo, Sri Lanka,2022,
Perera, R., Uduwanage, J., and Gamage, C.,".FPGA based Implementation of IEEE 802.11p/WAVE Protocol and Performance Evaluation.",16th IEEE International Conference on Industrial and Information Systems (ICIIS 2021),Kandy, Sri Lanka,2021,324-329
Gunathilake, L., Hettiwatta, T., Charles, S., and Gamage, C.,".Indoor Localization System Based on Bluetooth Low Energy With Inertial Sensor Assist for Resource Constrained Environments.",21st International Conference on Advances in ICT for Emerging Regions (ICter 2021),Colombo, Sri Lanka,2021,135-140
Ratnayake, K., Sooriyaarachchi, S., and Gamage, C.,".OENS: An Octomap Based Exploration and Navigation System.",5th International Conference on Robotics and Automation Sciences (ICRAS 2021),Wuhan, China,2021,230-234
Malith Jayaweera Indika Wijesooriya Damith Wijewardana Tharindu De Silva,".Enhanced Real-Time Machine Inspection with Mobile Augmented Reality for Maintenance and Repair: Demo Abstract.",Second International Conference on Internet-of-Things Design and Implementation,Philadelphia, USA,2017,287-288
Anuradha Welivita Nanduni Nimalsiri Ruchiranga Wickramasignhe Upekka Pathirana,".Virtual Product Try-on Solution for E-Commerce Using Mobile Augmented Reality.",4th International Conference on Augmented Reality, Virtual Reality and Computer Graphics (SALENTO AVR 2017),Ugento (Lecce), Italy,2017,
Malmi Amadoru,".Evaluating Effective Use of Social Networks for Recruitment.",2016 ACM SIGMIS Conference on Computers and People Research, SIGMIS-CPR 2016,Alexandria, Virginia, USA,2016,125--133
Sulochana J. Sooriyaarachchi Anil Fernando,".A cell biology inspired model for managing packet broadcasts in mobile ad-hoc networks.",18th International Conference on Advanced Communication Technology (ICACT),South Korea,2016,664 - 672
S. J. Sooriyaarachchi W. A. C. Fernando,".Analysis of packet flooding in dense MANETs using a probabilistic model.",18th International Conference on Advanced Communication Technology (ICACT),South Korea,2016,39 - 45
Dharmadasa, I., Weerasekara, M., Keppitiyagama, C. I. and Gamage, C.,".RSSI based Device-free Human Identification.",International Journal on Advances in ICT for Emerging Regions,16(1),2023
Pallemulla, P. S. H., Sooriyaarachchi, S. J., de Silva, C. R., and Gamage, C. D.,".Defect Detection in Woven Fabrics by Analysis of Co-occurrence Texture Features as a Function of Gray-level Quantization and Window Size.",Engineer: Journal of the Institution of Engineers, Sri Lanka,54(4),2021
Vipula Dissanayake Sachini Herath Sanka Rasnayaka Sachith Seneviratne Rajith Vidanaarachchi,".Real-Time Gesture Prediction Using Mobile Sensor Data for VR Applications.",International Journal of Machine Learning and Computing,6(3):215-219,2016
Publications
Samaranayake, V. and Gamage, C. D., “Employee perception towards electronic monitoring at work place and its impact on job satisfaction of software professionals in Sri Lanka”, Journal of Telematics and Informatics, 29 (2012) 233-244, Available online 24 August 2011.
Sandaruwan, H. G. L., Kumara, G. D. T., Dileepa, H. G. R., Gunaratna, H. D., and Gamage, C., “Innovative framework for human motion tracking for HCI”, In Proceedings of the CS&ES Conference 2011, pages 87-92, November 2011.
Sharma, K. and Gamage, C., “Security issues of virtual machine residues”, In Proceedings of the 17th Annual Research Symposium, Faculty of Engineering, University of Moratuwa, pages 186-188, December 2011.
Srijeyanthan, K., Thusyanthan, A., Joseph, C. N., Kokulakumaran, S., Gunasekara, C., and Gamage C.: Skeletonization in a Real-time Gesture Recognition System, In Proceedings of the Fifth International Conference on Information and Automation for Sustainability (ICIAfS 2010), pages 213-218, Colombo, Sri Lanka, December 2010. IEEE Computer Society (ISBN: 978-1-4244-8550-5)
Ranmuthugala, M. H. P. and Gamage, C.: Chaos Theory based Cryptography in Digital Image Distribution, In Proceedings of the 2010 International Conference on Advances in ICT for Emerging Regions (ICTer), pages 32-39, Colombo, Sri Lanka, September 2010. IEEE Computer Society (ISBN: 978-1-4244-9041-7)
Hettiarachchi, R. and Gamage, C.: Countering Ambiguity Attacks Against Digital Image Watermarking Schemes, In Proceedings of the 2010 CS&ES Conference (CSES 2010), pages 17-22, Moratuwa, Sri Lanka, September 2010 (ISBN: 978-955-9027-37-9)
Kumara, I. and Gamage, C.: Towards Reusing ESB Services in Different ESB Architectures, In Lin, X. and Yang, H., editors, Proceedings of the 34th Annual IEEE Software and Applications Conference (COMPSAC 2010) - Fourth IEEE International Workshop on Quality Oriented Reuse of Software (QUORS 2010), pages 25-30, Seoul, South Korea, July 2010 (ISBN: 978-0-7695-4105-1)
Joseph C. N., Kokulakumaran S., Srijeyanthan K., Thusyanthan A., Gunasekara C., and Gamage C. D.: A Framework for Whole-Body Gesture Recognition from Video Feeds, In Proceedings of the Fifth IEEE International Conference on Industrial and Information Systems (ICIIS 2010), , Karnatak, India, July 2010 (in print)
Dayananda, K.S., Amarawardhana, C., Porawagama, H., and Gamage, C.:, A Case Study of WSN as a Replacement for SCADA, In Proceedings of the Fourth IEEE International Conference on industrial and Information Systems (ICIIS 2009), pp. CIE2-4, Peradeniya, Sri Lanka, December 2009 (ISBN: 978-142-4448-37-1)
Malalasena, B. A., Nimalaprakasan, S., Ramanan, S., Shayanthan, K., Gamage, C., and Fernando, M. S. D.: Privacy Enhanced Data Management for an Electronic Identity System. In Proceedings of the 2009 Conference on Innovative Technologies in Intelligent Systems & Industrial Applications (CITISIA 2009), pages 358-363, Kuala Lumpur, Malaysia, July 2009. (ISBN: 978-1-4244-2886-1)
Malalasena, B. A., Nimalaprakasan, S., Ramanan, S., Shayanthan, K., Gamage, C., and Fernando, M. S. D.: Versatile Privacy Preserving Electronic Identity Framework. In Nanayakkara, V. and Gunasinghe, U. P., editors, Proceedings of the 2009 CS&ES Conference (CSES 2009), pages 133-140, Colombo, Sri Lanka, July 2009. (ISBN 9-78-955-9027-32-4).
Jesi, G. -P., Gavidia, D., Gamage, C., and van Steen, M.: A Secure Peer Sampling Service. In Proceedings of the Fourth IEEE International Conference on Autonomic Computing, Jacksonville, Florida, USA, June 2007. IEEE Computer Society.
Gavidia, D., van Steen, M., Gamage, C., and Jesi, G. -P,: Canning Spam in Wireless Gossip Networks. In Proceedings of the Fourth IEEE Conference on Wireless on Demand Network Systems and Services (WONS'07), pages 30-37, Obergurgl, Tyrol, Austria, January 2007. IEEE Computer Society (ISBN 1-42440-860-1).
Tanenbaum, A. S., Gamage, C., and Crispo, B.: Taking Sensor Networks from the Lab to the Jungle. In IEEE Computer, volume 39, number 8, pages 98-100, August 2006. (ISSN 0018-9162)
Gamage, C., Gras, B., Crispo, B., and Tanenbaum, A. S.: An Identity-based Ring Signature Scheme with Enhanced Privacy. In Kent, S., and Tsudik, G., editors, Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006), pages 1-5, Baltimore, Maryland, USA, August 2006. IEEE Communications Society (ISBN: 1-42440-423-1).
Gamage, C., Bicakci, K., Crispo, B., and Tanenbaum, A. S.: Security for the Mythical Air-dropped Sensor Network. In Bellavista, P. Chen, C.-M., Corradi, A., and Daneshmand, M., editors, Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), pages 41-47, Cagliari, Sardinia, Italy, June 2006. IEEE Computer Society (ISBN 0-76952-588-1).
Nair, S. K., Gamage, C., Crispo, B., and Tanenbaum, A. S.: Countering Digital Forensics. In Lelieveldt, B., Haverkort, B., and de Laat, C., editors, ASCI 2006, Proceedings of the 12th Annual Conference of the Advanced School for Computing and Imaging, Lommel, Belgium, June 2006.
Gamage, C., Leiwo, J., Bicakci, K., Crispo, B., and Tanenbaum, A. S.: A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks. In Palaniswami, M., editor, Proceedings of the Second International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2005), pages 45-50, Melbourne, Australia, December 2005. IEEE Computer Society (ISBN 0-78039-399-6).
Nair, S. K., Popescu, B. C., Gamage, C., Crispo, B., and Tanenbaum, A. S.: Enabling DRM-Preserving Digital Content Redistribution. In Müller, G. and Lin, K.-J., editors, Proceedings of the Seventh IEEE International Conference on E-Commerce Technology (CEC 2005), pages 151-158, München, Germany, July 2005. IEEE Computer Society (ISBN 0-76952-277-7).
Bicakci, K., Gamage, C., Crispo, B., and Tanenbaum, A. S.: One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks, In Molva, R., Tsudik, G., and Westhoff D., editors, Proceedings of the Second European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2005), volume 3813 of Lecture Notes in Computer Science, pages 80-90, Visegrad, Hungary, July 2005. Springer-Verlag (ISBN 3-54030-912-8),
Popescu, B. C., Gamage, C., and Tanenbaum, A.S.: Access Control, Reverse Access Control and Replication Control in a World Wide Distributed System. In Jerman-Blazic, B., and Klobucar, T., editors, Advanced Communications and Multimedia Security, Proceedings of theSixth Conference on Communications and Multimedia Security (CMS’02), volume 228 of International Federation for Information Processing (IFIP), pages 155-167, Portoroz, Slovenia, September 2002. Kluwer Academic Publishers (ISBN 1-402-07206-6).
Gamage, C., Leiwo, J., and Tanenbaum, A.S.: A Personalized Digital Watermarking Protocol for Secure Online Content Distribution. In Lagendijk, R. L., Heijnsdijk, J. W. J., Pimentel, A. D., and Wilkinson, M. H. F., editors, ASCI 2001, Proceedings of theSeventh Annual Conference of the Advanced School for Computing and Imaging, pages 476-483, Heijen, The Netherlands, May 2001. ASCI (ISBN 9-080-30866-8).
Mihailescu, P., Gamage, C., and Kendall, E. A.: Mobile Agent to User Interaction (MAUI). In Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), volume 8, pages 8032, Maui, Hawaii, January 2001. IEEE Computer Society (ISBN 0-769-50981-9).
Gamage, C., Leiwo, J., and Zheng, Y.: High Performance Agile Crypto Modules. In Dawson, E., Clark, A., and Boyd, C., editors, Information Security and Privacy, Proceedings of the Fifth Australasian Conference (ACISP 2000), volume 1841 of Lecture Notes in Computer Science, pages 74-88, Brisbane, QLD, Australia, July 2000. Springer-Verlag (ISBN 3-540-67742-9).
Mihailescu, P., Gamage, C., and Zheng, Y.: APE: An Agent Portal for Secure E-commerce with Wireless Internet Access by PDA. In Proceedings of the Evolve 2000 Conference, Sydney, Australia, February 2000. Cooperative Research Center for Enterprise Distributed Systems Technology (CRC-DSTC).
Leiwo, J., Hanle, C., Homburg, P., Gamage, C., and Tanenbaum, A. S.: A Security Design for a Wide-Area Distributed System. In Song, J. S., editor, Information Security and Cryptology, Proceedings of the Second International Conference (ICISC'99), volume 1787 of Lecture Notes in Computer Science, pages 236-256, Seoul, Korea, December 1999. Springer-Verlag (ISBN 3-540-67380-6).
Gamage, C., Leiwo, J., and Zheng, Y.: Why Hierarchical Key Distribution is Appropriate for Multicast Networks. In Song, J. S., editor, Information Security and Cryptology, Proceedings of the Second International Conference (ICISC'99), volume 1787 of Lecture Notes in Computer Science, pages 120-131, Seoul, Korea, December 1999. Springer-Verlag (ISBN 3-540-67380-6).
Mihailescu, P., Dospisil, J., Gamage, C., and Zheng, Y.: Mobile Agents in a Virtual Market. In Cooper, J. and Burgess, L., editors, Proceedings of the Third Annual Collaborative Electronic Commerce Technology and Research Conference (COLLECTER'99), Wellington, New Zealand, November 1999. (ISBN 0-86418-609-6).
Gamage, C., Leiwo, J., and Zheng, Y.: Timestamps for Network Authentication Protocols Revisited. In Yngström, L. and Svensson, T., editors, Proceedings of the Fourth Nordic Workshop on Secure IT Systems (NORDSEC'99), pages 269-289, Stockholm, Sweden, November 1999. Department of Computer and Systems Sciences, Stockholm University/Royal Institute of Technology (ISBN 9-17153-955-7).
Leiwo, J., Gamage, C., and Zheng, Y.: Organizational Modeling for Efficient Specification of Information Security Requirements. In Eder, J., Rozman, I. and Welzer, T., editors, Advances in Databases and Information Systems, Proceedings of the Third East European Conference (ADBIS'99), volume 1691 of Lecture Notes in Computer Science, pages 247-260, Maribor, Slovenia, September 1999. Springer-Verlag (ISBN 3-54066-485-8).
Gamage, C., Leiwo, J., and Zheng, Y.: Encrypted Message Authentication by Firewalls. In Imai, H. and Zheng, Y., editors, Public Key Cryptography, Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography (PKC'99), volume 1560 of Lecture Notes in Computer Science, pages 69-81, Kamakura, Japan, March 1999. Springer-Verlag (ISBN 3-54065-644-8).
Gamage, C., Leiwo, J., and Zheng, Y.: An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption. In Edwards, J., editor, Computer Science'99, Proceedings of the 22nd Australasian Computer Science Conference (ACSC'99), volume 21, number 1 of Australian Computer Science Communications, pages 420-431, Auckland, New Zealand, January 1999. Springer-Verlag (ISBN 9-81402-154-7).
Gamage, C., Leiwo, J., and Zheng, Y.: A Block-Based Approach to Secure ATM Networking. In Proceedings of the 1998 International Computer Symposium (ICS'98) Workshop on Cryptology and Information Security, pages 41-48, Tainan, Taiwan, December 1998. National Cheng Kung University (ISBN 9-57884-511-1).
Leiwo, J., Gamage, C., and Zheng, Y.: A Model for Assurance of External Properties of Information Security Requirement Bases. In Proceedings of the 1998 International Computer Symposium (ICS'98) Workshop on Cryptology and Information Security, pages 124-131, Tainan, Taiwan, December 1998. National Cheng Kung University (ISBN 9-57884-511-1).
Gamage, C., Leiwo, J., and Zheng, Y.: Fast Batch Verification of Schnorr Signatures. In Knapskog, S. J. and Brekne, T., editors, Proceedings of the Third Nordic Workshop on Secure IT Systems (NORDSEC'98), Trondheim, Norway, November 1998. Department of Telematics, NTNU (ISBN 8-29939-801-0).
Leiwo, J., Gamage, C., and Zheng, Y.: Harmonizer - A Tool for Processing Information Security Requirements in Organizations. In Knapskog, S. J. and Brekne, T., editors, Proceedings of the Third Nordic Workshop on Secure IT Systems (NORDSEC'98), Trondheim, Norway, November 1998. Department of Telematics, NTNU (ISBN 8-29939-801-0).
Leiwo, J., Gamage, C., and Zheng, Y.: An Object-Oriented Modeling Approach into the Management of Information Security. In Papp, G. and Posch, R., editors, Global IT-Security, Proceedings of the IFIP TC11 14th International Conference on Information Systems Security (IFIP/Sec'98), pages 575-579, Vienna, Austria and Budapest, Hungary, August-September 1998. Austrian Computer Society (ISBN 3-85403-116-5).
Leiwo, J., Gamage, C., and Zheng, Y.: A Mandatory Access Control Policy Model for Information Security Requirements. In McDonald, C., editor, Computer Science'98, Proceedings of the 21st Australasian Computer Science Conference (ACSC'98), volume 20, number 1 of Australian Computer Science Communications, pages 527-538, Perth, WA, Australia, February 1998. Springer-Verlag (ISBN 9-81308-390-5).
Gamage, C., Leiwo, J., and Zheng, Y.: Building Secure High Speed Extranets. In Karila, A. and Aalto, T., editors, Proceedings of theSecond Nordic Workshop on Secure Computer Systems (NORDSEC'97), Helsinki, Finland, November 1997. Helsinki University of Technology (ISBN 9-51223-783-0).
Gamage, C., Leiwo, J., and Zheng, Y.: ATM Cell Based Security Implementation. In Proceedings of the Second New Zealand ATM and Broadband Workshop (ATMWORKS'97), pages 67-82, Hamilton, New Zealand, February 1997. The University of Waikato.
Gamage, C., Kanchanasut, K., and Pallewatta, M.: Domain Name Services for Dynamic Hosts. In Proceedings of the Post-conference Workshop on Computer Networking: Putting Theory to Practice, 1995 Asian Computing Science Conference (AsianCSC'95), pages 20-30, Bangkok, Thailand, December 1995. Asian Institute of Technology.
Gamage, C.and Kanchanasut, K.: IP Addresses for Low Bandwidth Networks. In Proceedings of the XIV Conference of South East Asia Regional Computer Confederation (SEARCC'95), pages 646-658, Colombo, Sri Lanka, September 1995. Computer Society of Sri Lanka (ISBN 9-55915-503-2).