Tharindu Weerasinghe

Tharindu Weerasinghe
  • Master of Engineering
  • Operations Manager at Austal

EMSc|IS, MSc.Eng, BSc.Eng(Hons), C|EH, SMIEEE, FIEAust CPEng NER, MACS CP IP3P, MIET, MACM, MIESL CEng IntPE(Sri Lanka)

About

18
Publications
6,909
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
88
Citations
Introduction
Tharindu Weerasinghe received his first degree in Computer Engineering from the University of Peradeniya, Sri Lanka in 2007. He received his masters degree in Information & Communication Engineering from the same university in 2012. Tharindu has an Executive Masters in Information Security from Asia e University, Malaysia, graduated in 2017. Tharindu became a chartered computer engineer in 2015 and he is one of the very few chartered computer engineers in Sri Lanka. www.tharinduweerasinghe.com
Current institution
Austal
Current position
  • Operations Manager
Additional affiliations
January 2016 - December 2019
Seebo Networks Lanka (Pvt) Ltd.
Position
  • Head of Operations
Description
  • Was responsible for the entire operation including all Software R&D, HR, Finance and Marketing activities of Seebo Networks Lanka (Pvt) Ltd. Seebo Networks Lanka (Pvt) Ltd was an offshore software development centre for Seebo Networks Pty Limited, Australia, a company that specializes in home entertainment firmware and home electrical planning software. This company is no longer operational in Sri Lanka.
October 2020 - October 2022
Austal
Position
  • Operations Manager
Description
  • Responsible for LUSI (Lifecycle Upkeep Sustainment Intelligence) Support which is an Asset Maintenance Management software solution which Austal develops for the future Maritime Industry. Moreover, I am pretty much involved in IFS Technical Support and Configurations. IFS is an Enterprise Resource Planning Software widely used in the Oil and Gas industry.
April 2020 - October 2020
BlackSwan Technologies
Position
  • Group Leader
Description
  • Was responsible for the Technical Support Team of BlackSwan Technologies. Leading a team of 7 Senior Support Engineers who are technical support engineers, Senior DevOps Engineers and a Software Engineer. Dealing with stakeholders from the US, UK, Israel, Poland, Germany, India, Pakistan and Sri Lanka (Worked remotely for Sri Lankan hours from WA, Australia)
Education
January 2016 - October 2017
Asia e University
Field of study
  • Information Security
January 2008 - May 2012
University of Peradeniya
Field of study
  • Information and Communication Engineering
March 2003 - August 2007
University of Peradeniya
Field of study
  • Computer Engineering

Publications

Publications (18)
Article
Full-text available
In this paper, analysis of a simply modified RC4 algorithm is presented. RC4 is the most widely used stream cipher and it is not considered as a cipher that is strong in security. Many alternatives have been proposed to improve RC4 key generation and pseudo random number generation but the thoughts behind this work is to try out a simple modificati...
Conference Paper
Full-text available
RC4 is the most widely used stream cipher around. A lot of modifications of RC4 cipher can be seen in open literature. Most of them enhance the secrecy of the cipher and the security levels have been analyzed theoretically by using mathematics. In this paper, a new effective RC4 cipher is proposed and the security analysis has been done using Shann...
Article
Full-text available
RC4 is the most widely used stream cipher around. So, it is important that it runs cost effectively, with minimum encryption time. In other words, it should give higher throughput. In this paper, a mechanism is proposed to improve the throughput of RC4 algorithm in multicore processors using multithreading. The proposed mechanism does not paralleli...
Conference Paper
Full-text available
Education is a never-ending process in life. Proper education in any domain, will make you a competent person in that particular domain. Education has different type of sectors in the likes of kindergarten, primary, secondary, tertiary and above. Further, vocational and technical education are also notable. In this research study, the overall objec...
Article
Purpose Supply chains are facing several challenges due to disruptions and changing situations such as COVID-19 and the need for increased levels of resilience is more important than ever. This paper focuses on exploring the impact of artificial intelligence (AI) on supply chain resilience (SCR) through a review of the existing literature. To addre...
Article
Full-text available
Circular Economy (CE) is a much-discussed topic among the contemporary academia and industry with the emerging threats of the scarcity of global natural resources and monetary capabilities of small and medium scale industries around the globe. With the fifth industrial revolution, which we refer to it as the Industry5.0, the phenomena in the likes...
Data
Abstract: Healthcare Supply Chain (HSC) traceability involves a wide range of stakeholders, including raw material suppliers, manufacturers, distributors, regulatory authorities, pharmacies, hospitals, and patients. For a HSC system that is unalterable, trustworthy, accountable, and transparent, blockchain-based drug tracking offers a promising sol...
Article
Full-text available
The security of the Internet is mainly based on Secure Socket Layer (SSL) or its successor Transport Layer Security (TLS). To secure the on-line transactions, the organizations widely use the particular protocol(s) in their web portals. In SSL, a lot of cipher suits are used as encryption algorithms. RC4 is the most commonly used stream cipher (alt...
Research
Full-text available
The security of the Internet is mainly based on Secure Socket Layer (SSL) or its successor Transport Layer Security (TLS). To secure the on-line transactions, the organizations widely use the particular protocol(s) in their web portals. In SSL, a lot of cipher suits are used as encryption algorithms. RC4 is the most commonly used stream cipher (alt...
Article
Full-text available
With the growth of the internet and the interconnectivity of computer and data networks, security of data transmission has always been a concern of many stakeholders of information and communication arena. Among them, the researchers who work in the field of Cryptography and Network Security pay a lot attention to deliver highly secured and cost ef...
Article
Full-text available
There can be two vital criteria of selecting an algorithm to fulfil one’s encryption requirement. The security level of the cipher (secrecy) and the encryption time (performance). There is less focus on secrecy of ciphers as a security measurement, thus in this research, Shannon’s theories on secrecy of ciphers are used in-order to calculate the av...
Article
Full-text available
Block and stream ciphers can be joined in order to obtain hybrid algorithms and the main idea of combining can be enhancing the security of the cipher. This paper is presented to illustrate a hybrid algorithm created by combining a block cipher algorithm, TripleDES (ECB mode) and a stream cipher algorithm, RC4. In the encryption mode, first the pla...

Network

Cited By