
Tharindu Weerasinghe- Master of Engineering
- Operations Manager at Austal
Tharindu Weerasinghe
- Master of Engineering
- Operations Manager at Austal
EMSc|IS, MSc.Eng, BSc.Eng(Hons), C|EH, SMIEEE, FIEAust CPEng NER, MACS CP IP3P, MIET, MACM, MIESL CEng IntPE(Sri Lanka)
About
18
Publications
6,909
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
88
Citations
Introduction
Tharindu Weerasinghe received his first degree in Computer Engineering from the University of Peradeniya, Sri Lanka in 2007. He received his masters degree in Information & Communication Engineering from the same university in 2012. Tharindu has an Executive Masters in Information Security from Asia e University, Malaysia, graduated in 2017. Tharindu became a chartered computer engineer in 2015 and he is one of the very few chartered computer engineers in Sri Lanka.
www.tharinduweerasinghe.com
Current institution
Additional affiliations
January 2016 - December 2019
Seebo Networks Lanka (Pvt) Ltd.
Position
- Head of Operations
Description
- Was responsible for the entire operation including all Software R&D, HR, Finance and Marketing activities of Seebo Networks Lanka (Pvt) Ltd. Seebo Networks Lanka (Pvt) Ltd was an offshore software development centre for Seebo Networks Pty Limited, Australia, a company that specializes in home entertainment firmware and home electrical planning software. This company is no longer operational in Sri Lanka.
October 2020 - October 2022

Position
- Operations Manager
Description
- Responsible for LUSI (Lifecycle Upkeep Sustainment Intelligence) Support which is an Asset Maintenance Management software solution which Austal develops for the future Maritime Industry. Moreover, I am pretty much involved in IFS Technical Support and Configurations. IFS is an Enterprise Resource Planning Software widely used in the Oil and Gas industry.
April 2020 - October 2020
BlackSwan Technologies
Position
- Group Leader
Description
- Was responsible for the Technical Support Team of BlackSwan Technologies. Leading a team of 7 Senior Support Engineers who are technical support engineers, Senior DevOps Engineers and a Software Engineer. Dealing with stakeholders from the US, UK, Israel, Poland, Germany, India, Pakistan and Sri Lanka (Worked remotely for Sri Lankan hours from WA, Australia)
Education
January 2016 - October 2017
January 2008 - May 2012
March 2003 - August 2007
Publications
Publications (18)
In this paper, analysis of a simply modified RC4 algorithm is presented. RC4 is the most widely used stream cipher and it is not considered as a cipher that is strong in security. Many alternatives have been proposed to improve RC4 key generation and pseudo random number generation but the thoughts behind this work is to try out a simple modificati...
RC4 is the most widely used stream cipher around. A lot of modifications of RC4 cipher can be seen in open literature. Most of them enhance the secrecy of the cipher and the security levels have been analyzed theoretically by using mathematics. In this paper, a new effective RC4 cipher is proposed and the security analysis has been done using Shann...
RC4 is the most widely used stream cipher around. So, it is important that it runs cost effectively, with minimum encryption time. In other words, it should give higher throughput. In this paper, a mechanism is proposed to improve the throughput of RC4 algorithm in multicore processors using multithreading. The proposed mechanism does not paralleli...
Education is a never-ending process in life. Proper education in any domain, will make you a competent person in that particular domain. Education has different type of sectors in the likes of kindergarten, primary, secondary, tertiary and above. Further, vocational and technical education are also notable. In this research study, the overall objec...
Purpose
Supply chains are facing several challenges due to disruptions and changing situations such as COVID-19 and the need for increased levels of resilience is more important than ever. This paper focuses on exploring the impact of artificial intelligence (AI) on supply chain resilience (SCR) through a review of the existing literature. To addre...
Circular Economy (CE) is a much-discussed topic among the contemporary academia and industry with the emerging threats of the scarcity of global natural resources and monetary capabilities of small and medium scale industries around the globe. With the fifth industrial revolution, which we refer to it as the Industry5.0, the phenomena in the likes...
Abstract:
Healthcare Supply Chain (HSC) traceability involves a wide range of stakeholders, including raw material suppliers, manufacturers, distributors, regulatory authorities, pharmacies, hospitals, and patients. For a HSC system that is unalterable, trustworthy, accountable, and transparent, blockchain-based drug tracking offers a promising sol...
The security of the Internet is mainly based on Secure Socket Layer (SSL) or its successor Transport Layer Security (TLS). To secure the on-line transactions, the organizations widely use the particular protocol(s) in their web portals. In SSL, a lot of cipher suits are used as encryption algorithms. RC4 is the most commonly used stream cipher (alt...
The security of the Internet is mainly based on Secure Socket Layer (SSL) or its successor Transport Layer Security (TLS). To secure the on-line transactions, the organizations widely use the particular protocol(s) in their web portals. In SSL, a lot of cipher suits are used as encryption algorithms. RC4 is the most commonly used stream cipher (alt...
With the growth of the internet and the interconnectivity of computer
and data networks, security of data transmission has always been a
concern of many stakeholders of information and communication
arena. Among them, the researchers who work in the field of
Cryptography and Network Security pay a lot attention to deliver
highly secured and cost ef...
There can be two vital criteria of selecting an algorithm to fulfil one’s encryption requirement. The security level of the cipher (secrecy) and the encryption time (performance). There is less focus on secrecy of ciphers as a security measurement, thus in this research, Shannon’s theories on secrecy of ciphers are used in-order to calculate the av...
Block and stream ciphers can be joined in order to obtain hybrid algorithms and the main idea of combining can be enhancing the security of the cipher. This paper is presented to illustrate a hybrid algorithm created by combining a block cipher algorithm, TripleDES (ECB mode) and a stream cipher algorithm, RC4.
In the encryption mode, first the pla...