BibTeX records: G. P. Biswas

download as .bib file

@article{DBLP:journals/wpc/AdhikariROB23,
  author       = {Sharmistha Adhikari and
                  Sangram Ray and
                  Mohammad S. Obaidat and
                  G. P. Biswas},
  title        = {ECC-based Efficient and Secure Access Control Scheme for Content Centric
                  Network-A Next Generation Internet},
  journal      = {Wirel. Pers. Commun.},
  volume       = {132},
  number       = {1},
  pages        = {571--607},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-023-10625-8},
  doi          = {10.1007/S11277-023-10625-8},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/AdhikariROB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KaibarttaBPD21,
  author       = {Tanusree Kaibartta and
                  G. P. Biswas and
                  Arup Kumar Pal and
                  Debesh Kumar Das},
  title        = {A Genetic Algorithm-Based Metaheuristic Approach for Test Cost Optimization
                  of 3D {SIC}},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {160987--161002},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3131336},
  doi          = {10.1109/ACCESS.2021.3131336},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KaibarttaBPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KaratiAMSB21,
  author       = {Arijit Karati and
                  Ruhul Amin and
                  Prerna Mohit and
                  Venkatasamy Sureshkumar and
                  G. P. Biswas},
  title        = {Design of a secure file storage and access protocol for cloud-enabled
                  Internet of Things environment},
  journal      = {Comput. Electr. Eng.},
  volume       = {94},
  pages        = {107298},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.compeleceng.2021.107298},
  doi          = {10.1016/J.COMPELECENG.2021.107298},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/KaratiAMSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/MohitAB21,
  author       = {Prerna Mohit and
                  Ruhul Amin and
                  G. P. Biswas},
  title        = {An e-healthcare authentication protocol employing cloud computing},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {36},
  number       = {3},
  pages        = {155--168},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJAHUC.2021.113873},
  doi          = {10.1504/IJAHUC.2021.113873},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/MohitAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/SadhukhanRBKD21,
  author       = {Dipanwita Sadhukhan and
                  Sangram Ray and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Mou Dasgupta},
  title        = {A lightweight remote user authentication scheme for IoT communication
                  using elliptic curve cryptography},
  journal      = {J. Supercomput.},
  volume       = {77},
  number       = {2},
  pages        = {1114--1151},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11227-020-03318-7},
  doi          = {10.1007/S11227-020-03318-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/SadhukhanRBKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/AdhikariROB20,
  author       = {Sharmistha Adhikari and
                  Sangram Ray and
                  Mohammad S. Obaidat and
                  G. P. Biswas},
  title        = {Efficient and secure content dissemination architecture for content
                  centric network using ECC-based public key infrastructure},
  journal      = {Comput. Commun.},
  volume       = {157},
  pages        = {187--203},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.04.024},
  doi          = {10.1016/J.COMCOM.2020.04.024},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/AdhikariROB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/KaibarttaBD20,
  author       = {Tanusree Kaibartta and
                  G. P. Biswas and
                  Debesh Kumar Das},
  title        = {Co-Optimization of Test Wrapper Length and {TSV} for {TSV} Based 3D
                  SOCs},
  journal      = {J. Electron. Test.},
  volume       = {36},
  number       = {2},
  pages        = {239--253},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10836-020-05872-7},
  doi          = {10.1007/S10836-020-05872-7},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/et/KaibarttaBD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ats/KaibarttaBD20,
  author       = {Tanusree Kaibartta and
                  G. P. Biswas and
                  Debesh K. Das},
  title        = {Heuristic Approach for Identification of Random {TSV} Defects in 3D
                  {IC} During Pre-bond Testing},
  booktitle    = {29th {IEEE} Asian Test Symposium, {ATS} 2020, Penang, Malaysia, November
                  23-26, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ATS49688.2020.9301580},
  doi          = {10.1109/ATS49688.2020.9301580},
  timestamp    = {Fri, 15 Jan 2021 14:54:20 +0100},
  biburl       = {https://dblp.org/rec/conf/ats/KaibarttaBD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/MukherjeeGB19,
  author       = {Sankar Mukherjee and
                  Daya Sagar Gupta and
                  G. P. Biswas},
  title        = {An efficient and batch verifiable conditional privacy-preserving authentication
                  scheme for VANETs using lattice},
  journal      = {Computing},
  volume       = {101},
  number       = {12},
  pages        = {1763--1788},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00607-018-0689-3},
  doi          = {10.1007/S00607-018-0689-3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/MukherjeeGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/KaratiB19,
  author       = {Arijit Karati and
                  G. P. Biswas},
  title        = {Provably secure and authenticated data sharing protocol for IoT-based
                  crowdsensing network},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {30},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1002/ett.3315},
  doi          = {10.1002/ETT.3315},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/KaratiB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/AdhikariRBO19,
  author       = {Sharmistha Adhikari and
                  Sangram Ray and
                  Gosta Pada Biswas and
                  Mohammad S. Obaidat},
  title        = {Efficient and secure business model for content centric network using
                  elliptic curve cryptography},
  journal      = {Int. J. Commun. Syst.},
  volume       = {32},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/dac.3839},
  doi          = {10.1002/DAC.3839},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/AdhikariRBO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/MukherjeeAB19,
  author       = {Sankar Mukherjee and
                  Ruhul Amin and
                  G. P. Biswas},
  title        = {Design of routing protocol for multi-sink based wireless sensor networks},
  journal      = {Wirel. Networks},
  volume       = {25},
  number       = {7},
  pages        = {4331--4347},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11276-019-02095-3},
  doi          = {10.1007/S11276-019-02095-3},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/MukherjeeAB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/AminIBO18,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Mohammad S. Obaidat},
  title        = {A robust mutual authentication protocol for {WSN} with multiple base-stations},
  journal      = {Ad Hoc Networks},
  volume       = {75-76},
  pages        = {1--18},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.adhoc.2018.03.007},
  doi          = {10.1016/J.ADHOC.2018.03.007},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/AminIBO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/GuptaB18,
  author       = {Daya Sagar Gupta and
                  G. P. Biswas},
  title        = {Design of lattice-based ElGamal encryption and signature schemes using
                  {SIS} problem},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {29},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/ett.3255},
  doi          = {10.1002/ETT.3255},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/GuptaB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AminKBIC18,
  author       = {Ruhul Amin and
                  Neeraj Kumar and
                  G. P. Biswas and
                  Rahat Iqbal and
                  Victor I. Chang},
  title        = {A light weight authentication protocol for IoT-enabled devices in
                  distributed Cloud Computing environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {1005--1019},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.12.028},
  doi          = {10.1016/J.FUTURE.2016.12.028},
  timestamp    = {Sat, 17 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AminKBIC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AminIBKK18,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {A robust and anonymous patient monitoring system using wireless medical
                  sensor networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {80},
  pages        = {483--495},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.05.032},
  doi          = {10.1016/J.FUTURE.2016.05.032},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AminIBKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/GuptaB18,
  author       = {Daya Sagar Gupta and
                  G. P. Biswas},
  title        = {A novel and efficient lattice-based authenticated key exchange protocol
                  in {C-K} model},
  journal      = {Int. J. Commun. Syst.},
  volume       = {31},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/dac.3473},
  doi          = {10.1002/DAC.3473},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/GuptaB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KaratiIBBVK18,
  author       = {Arijit Karati and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Md. Zakirul Alam Bhuiyan and
                  Pandi Vijayakumar and
                  Marimuthu Karuppiah},
  title        = {Provably Secure Identity-Based Signcryption Scheme for Crowdsourced
                  Industrial Internet of Things Environments},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {4},
  pages        = {2904--2914},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2017.2741580},
  doi          = {10.1109/JIOT.2017.2741580},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/KaratiIBBVK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/KaratiIB18,
  author       = {Arijit Karati and
                  SK Hafizul Islam and
                  G. P. Biswas},
  title        = {A pairing-free and provably secure certificateless signature scheme},
  journal      = {Inf. Sci.},
  volume       = {450},
  pages        = {378--391},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.03.053},
  doi          = {10.1016/J.INS.2018.03.053},
  timestamp    = {Fri, 01 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/KaratiIB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/MukherjeeB18,
  author       = {Sankar Mukherjee and
                  G. P. Biswas},
  title        = {Location estimation based routing for mobile adhoc network},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {35},
  number       = {2},
  pages        = {1209--1224},
  year         = {2018},
  url          = {https://doi.org/10.3233/JIFS-169666},
  doi          = {10.3233/JIFS-169666},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/MukherjeeB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/BanerjeeGB18,
  author       = {Shalini Banerjee and
                  Daya Sagar Gupta and
                  G. P. Biswas},
  title        = {Hierarchy-based cheating detection and cheater identification in secret
                  sharing schemes},
  booktitle    = {2018 4th International Conference on Recent Advances in Information
                  Technology (RAIT), Dhanbad, India, March 15-17, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/RAIT.2018.8389094},
  doi          = {10.1109/RAIT.2018.8389094},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/BanerjeeGB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/GuptaBN18,
  author       = {Daya Sagar Gupta and
                  G. P. Biswas and
                  Roushan Nandan},
  title        = {Security weakness of a lattice-based key exchange protocol},
  booktitle    = {2018 4th International Conference on Recent Advances in Information
                  Technology (RAIT), Dhanbad, India, March 15-17, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/RAIT.2018.8389018},
  doi          = {10.1109/RAIT.2018.8389018},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/GuptaBN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbdcn/MohitB17,
  author       = {Prerna Mohit and
                  G. P. Biswas},
  title        = {Modification of Traditional {RSA} into Symmetric-RSA Cryptosystems},
  journal      = {Int. J. Bus. Data Commun. Netw.},
  volume       = {13},
  number       = {1},
  pages        = {66--73},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJBDCN.2017010106},
  doi          = {10.4018/IJBDCN.2017010106},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbdcn/MohitB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/IslamFBKO17,
  author       = {SK Hafizul Islam and
                  Mohammad Sabzinejad Farash and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Mohammad S. Obaidat},
  title        = {A pairing-free certificateless digital multisignature scheme using
                  elliptic curve cryptography},
  journal      = {Int. J. Comput. Math.},
  volume       = {94},
  number       = {1},
  pages        = {39--55},
  year         = {2017},
  url          = {https://doi.org/10.1080/00207160.2015.1088148},
  doi          = {10.1080/00207160.2015.1088148},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/IslamFBKO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/AminIOBH17,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  Mohammad S. Obaidat and
                  G. P. Biswas and
                  Kuei{-}Fang Hsiao},
  title        = {An anonymous and robust multi-server authentication protocol using
                  multiple registration servers},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {18},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.3457},
  doi          = {10.1002/DAC.3457},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/AminIOBH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/GuptaB17,
  author       = {Daya Sagar Gupta and
                  G. P. Biswas},
  title        = {An ECC-based authenticated group key exchange protocol in {IBE} framework},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {18},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.3363},
  doi          = {10.1002/DAC.3363},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/GuptaB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/GuptaB17,
  author       = {Daya Sagar Gupta and
                  G. P. Biswas},
  title        = {A Secure Cloud Storage using ECC-Based Homomorphic Encryption},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {11},
  number       = {3},
  pages        = {54--62},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJISP.2017070105},
  doi          = {10.4018/IJISP.2017070105},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/GuptaB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/IslamB17,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {A pairing-free identity-based two-party authenticated key agreement
                  protocol for secure and efficient communication},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {29},
  number       = {1},
  pages        = {63--73},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jksuci.2015.01.004},
  doi          = {10.1016/J.JKSUCI.2015.01.004},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/IslamB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/IslamABF0K17,
  author       = {SK Hafizul Islam and
                  Ruhul Amin and
                  G. P. Biswas and
                  Mohammad Sabzinejad Farash and
                  Xiong Li and
                  Saru Kumari},
  title        = {An improved three party authenticated key exchange protocol using
                  hash function and elliptic curve cryptography for mobile-commerce
                  environments},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {29},
  number       = {3},
  pages        = {311--324},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jksuci.2015.08.002},
  doi          = {10.1016/J.JKSUCI.2015.08.002},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/IslamABF0K17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/MohitAKBK17,
  author       = {Prerna Mohit and
                  Ruhul Amin and
                  Arijit Karati and
                  G. P. Biswas and
                  Muhammad Khurram Khan},
  title        = {A Standard Mutual Authentication Protocol for Cloud Computing Based
                  Health Care System},
  journal      = {J. Medical Syst.},
  volume       = {41},
  number       = {4},
  pages        = {50:1--50:13},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10916-017-0699-2},
  doi          = {10.1007/S10916-017-0699-2},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/MohitAKBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/MohitAB17,
  author       = {Prerna Mohit and
                  Ruhul Amin and
                  G. P. Biswas},
  title        = {Design of authentication protocol for wireless sensor network-based
                  smart vehicular system},
  journal      = {Veh. Commun.},
  volume       = {9},
  pages        = {64--71},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.vehcom.2017.02.006},
  doi          = {10.1016/J.VEHCOM.2017.02.006},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/MohitAB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/GuptaB17,
  author       = {Daya Sagar Gupta and
                  G. P. Biswas},
  title        = {On Securing Bi- and Tri-partite Session Key Agreement Protocol Using
                  {IBE} Framework},
  journal      = {Wirel. Pers. Commun.},
  volume       = {96},
  number       = {3},
  pages        = {4505--4524},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4399-5},
  doi          = {10.1007/S11277-017-4399-5},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/GuptaB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MalweTB17,
  author       = {Shweta R. Malwe and
                  Naman Taneja and
                  G. P. Biswas},
  title        = {Enhancement of {DSR} and {AODV} Protocols Using Link Availability
                  Prediction},
  journal      = {Wirel. Pers. Commun.},
  volume       = {97},
  number       = {3},
  pages        = {4451--4466},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4733-y},
  doi          = {10.1007/S11277-017-4733-Y},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/MalweTB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmc2/MohitAB17,
  author       = {Prerna Mohit and
                  Ruhul Amin and
                  G. P. Biswas},
  editor       = {Debasis Giri and
                  Ram N. Mohapatra and
                  Heinrich Begehr and
                  Mohammad S. Obaidat},
  title        = {Design of Secure and Efficient Electronic Payment System for Mobile
                  Users},
  booktitle    = {Mathematics and Computing - Third International Conference, {ICMC}
                  2017, Haldia, India, January 17-21, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {655},
  pages        = {34--43},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-4642-1\_4},
  doi          = {10.1007/978-981-10-4642-1\_4},
  timestamp    = {Mon, 11 Mar 2019 12:15:04 +0100},
  biburl       = {https://dblp.org/rec/conf/icmc2/MohitAB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/AminB16,
  author       = {Ruhul Amin and
                  G. P. Biswas},
  title        = {A secure light weight scheme for user authentication and key agreement
                  in multi-gateway based wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {36},
  pages        = {58--80},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.adhoc.2015.05.020},
  doi          = {10.1016/J.ADHOC.2015.05.020},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/AminB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/MalweB16,
  author       = {Shweta R. Malwe and
                  G. P. Biswas},
  title        = {Analysis and enhancement of pair-wise code assignment scheme used
                  in Code Division Multiple Access protocol},
  journal      = {Comput. Electr. Eng.},
  volume       = {56},
  pages        = {157--170},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.compeleceng.2015.10.004},
  doi          = {10.1016/J.COMPELECENG.2015.10.004},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/MalweB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AminIBKLK16,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Lu Leng and
                  Neeraj Kumar},
  title        = {Design of an anonymity-preserving three-factor authenticated key exchange
                  protocol for wireless sensor networks},
  journal      = {Comput. Networks},
  volume       = {101},
  pages        = {42--62},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.01.006},
  doi          = {10.1016/J.COMNET.2016.01.006},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AminIBKLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/MalweB16,
  author       = {Shweta R. Malwe and
                  G. P. Biswas},
  title        = {Routing and {CDMA-MAC} based cross-layering for wireless ad hoc networks},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {21},
  number       = {4},
  pages        = {245--258},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJAHUC.2016.076368},
  doi          = {10.1504/IJAHUC.2016.076368},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/MalweB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KaratiB16,
  author       = {Arijit Karati and
                  G. P. Biswas},
  title        = {Efficient and provably secure random oracle-free adaptive identity-based
                  encryption with short-signature scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {17},
  pages        = {4060--4074},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1588},
  doi          = {10.1002/SEC.1588},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KaratiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AminIBGKK16,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Debasis Giri and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {A more secure and privacy-aware anonymous user authentication scheme
                  for distributed mobile cloud computing environments},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {17},
  pages        = {4650--4666},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1655},
  doi          = {10.1002/SEC.1655},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/AminIBGKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/RayBD16,
  author       = {Sangram Ray and
                  G. P. Biswas and
                  Mou Dasgupta},
  title        = {Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography},
  journal      = {Wirel. Pers. Commun.},
  volume       = {90},
  number       = {3},
  pages        = {1331--1354},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11277-016-3393-7},
  doi          = {10.1007/S11277-016-3393-7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/RayBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/MohitB16,
  author       = {Prerna Mohit and
                  G. P. Biswas},
  editor       = {Suresh Chandra Satapathy and
                  Vikrant Bhateja and
                  Siba K. Udgata and
                  Prasant Kumar Pattnaik},
  title        = {Confidentiality and Storage of Data in Cloud Environment},
  booktitle    = {Proceedings of the 5th International Conference on Frontiers in Intelligent
                  Computing: Theory and Applications - {FICTA} 2016, Bhubaneswar, Odisa,
                  India, Volume 2},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {516},
  pages        = {289--295},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-981-10-3156-4\_29},
  doi          = {10.1007/978-981-10-3156-4\_29},
  timestamp    = {Wed, 19 May 2021 13:26:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ficta/MohitB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/BiswasMB16,
  author       = {Anindya Kumar Biswas and
                  S. Mukhopadhyay and
                  G. P. Biswas},
  editor       = {Suresh Chandra Satapathy and
                  Vikrant Bhateja and
                  Siba K. Udgata and
                  Prasant Kumar Pattnaik},
  title        = {Design of Visual Cryptography Scheme Using C(m, w) Combinations},
  booktitle    = {Proceedings of the 5th International Conference on Frontiers in Intelligent
                  Computing: Theory and Applications - {FICTA} 2016, Bhubaneswar, Odisa,
                  India, Volume 2},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {516},
  pages        = {447--455},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-981-10-3156-4\_46},
  doi          = {10.1007/978-981-10-3156-4\_46},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ficta/BiswasMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icacci/KaratiB16,
  author       = {Arijit Karati and
                  G. P. Biswas},
  title        = {A practical identity based signcryption scheme from bilinear pairing},
  booktitle    = {2016 International Conference on Advances in Computing, Communications
                  and Informatics, {ICACCI} 2016, Jaipur, India, September 21-24, 2016},
  pages        = {832--836},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICACCI.2016.7732149},
  doi          = {10.1109/ICACCI.2016.7732149},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icacci/KaratiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictcs2/MohitB16,
  author       = {Prerna Mohit and
                  G. P. Biswas},
  title        = {Modification of Symmetric-Key {DES} into Efficient Asymmetric-Key
                  {DES} using {RSA}},
  booktitle    = {{ICTCS}},
  pages        = {136:1--136:5},
  year         = {2016},
  url          = {https://doi.org/10.1145/2905055.2905352},
  doi          = {10.1145/2905055.2905352},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictcs2/MohitB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/MalweRB16,
  author       = {Shweta R. Malwe and
                  Soniya Rohilla and
                  G. P. Biswas},
  title        = {Location and selective-bordercast based enhancement of zone routing
                  protocol},
  booktitle    = {2016 3rd International Conference on Recent Advances in Information
                  Technology (RAIT), Dhanbad, India, March 3-5, 2016},
  pages        = {83--88},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/RAIT.2016.7507880},
  doi          = {10.1109/RAIT.2016.7507880},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/MalweRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/TiwariPB16,
  author       = {Minu Tiwari and
                  Soumyashree S. Panda and
                  G. P. Biswas},
  title        = {An improved secure remote login protocol with three-factor authentication},
  booktitle    = {2016 3rd International Conference on Recent Advances in Information
                  Technology (RAIT), Dhanbad, India, March 3-5, 2016},
  pages        = {372--378},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/RAIT.2016.7507932},
  doi          = {10.1109/RAIT.2016.7507932},
  timestamp    = {Thu, 07 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rait/TiwariPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/GuptaMKAB16,
  author       = {Anurag Gupta and
                  Prema Mohit and
                  Arijit Karati and
                  Ruhul Amin and
                  G. P. Biswas},
  title        = {Malicious node detection using ID-based authentication technique},
  booktitle    = {2016 3rd International Conference on Recent Advances in Information
                  Technology (RAIT), Dhanbad, India, March 3-5, 2016},
  pages        = {398--403},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/RAIT.2016.7507935},
  doi          = {10.1109/RAIT.2016.7507935},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rait/GuptaMKAB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/AminIKB16,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  Arijit Karati and
                  G. P. Biswas},
  title        = {Design of an enhanced authentication protocol and its verification
                  using {AVISPA}},
  booktitle    = {2016 3rd International Conference on Recent Advances in Information
                  Technology (RAIT), Dhanbad, India, March 3-5, 2016},
  pages        = {404--409},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/RAIT.2016.7507936},
  doi          = {10.1109/RAIT.2016.7507936},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rait/AminIKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcit-igi/GuptaB15,
  author       = {Daya Sagar Gupta and
                  G. P. Biswas},
  title        = {Secure Computation on Cloud Storage: {A} Homomorphic Approach},
  journal      = {J. Cases Inf. Technol.},
  volume       = {17},
  number       = {3},
  pages        = {22--29},
  year         = {2015},
  url          = {https://doi.org/10.4018/JCIT.2015070103},
  doi          = {10.4018/JCIT.2015070103},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcit-igi/GuptaB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/IslamB15,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {Cryptanalysis and improvement of a password-based user authentication
                  scheme for the integrated {EPR} information system},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {27},
  number       = {2},
  pages        = {211--221},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jksuci.2014.03.018},
  doi          = {10.1016/J.JKSUCI.2014.03.018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/IslamB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/AminB15,
  author       = {Ruhul Amin and
                  G. P. Biswas},
  title        = {A Novel User Authentication and Key Agreement Protocol for Accessing
                  Multi-Medical Server Usable in {TMIS}},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {3},
  pages        = {33},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0217-3},
  doi          = {10.1007/S10916-015-0217-3},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/AminB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/AminB15a,
  author       = {Ruhul Amin and
                  G. P. Biswas},
  title        = {A Secure Three-Factor User Authentication and Key Agreement Protocol
                  for {TMIS} With User Anonymity},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {8},
  pages        = {78},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0258-7},
  doi          = {10.1007/S10916-015-0258-7},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/AminB15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/AminB15b,
  author       = {Ruhul Amin and
                  G. P. Biswas},
  title        = {An Improved {RSA} Based User Authentication and Session Key Agreement
                  Protocol Usable in {TMIS}},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {8},
  pages        = {79},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0262-y},
  doi          = {10.1007/S10916-015-0262-Y},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/AminB15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/AminIBKO15,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Mohammad S. Obaidat},
  title        = {Design and Analysis of an Enhanced Patient-Server Mutual Authentication
                  Protocol for Telecare Medical Information System},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {11},
  pages        = {137:1--137:20},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0307-2},
  doi          = {10.1007/S10916-015-0307-2},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/AminIBKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/AminIBKL15,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Xiong Li},
  title        = {Cryptanalysis and Enhancement of Anonymity Preserving Remote User
                  Mutual Authentication and Session Key Agreement Scheme for E-Health
                  Care Systems},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {11},
  pages        = {140:1--140:21},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0318-z},
  doi          = {10.1007/S10916-015-0318-Z},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/AminIBKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/AminIBKK15,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan and
                  Neeraj Kumar},
  title        = {An Efficient and Practical Smart Card Based Anonymity Preserving User
                  Authentication Scheme for {TMIS} using Elliptic Curve Cryptography},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {11},
  pages        = {180},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0351-y},
  doi          = {10.1007/S10916-015-0351-Y},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/AminIBKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/IslamB15,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {Design of Two-Party Authenticated Key Agreement Protocol Based on
                  {ECC} and Self-Certified Public Keys},
  journal      = {Wirel. Pers. Commun.},
  volume       = {82},
  number       = {4},
  pages        = {2727--2750},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-015-2375-5},
  doi          = {10.1007/S11277-015-2375-5},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/IslamB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/AminB15,
  author       = {Ruhul Amin and
                  G. P. Biswas},
  title        = {Design and Analysis of Bilinear Pairing Based Mutual Authentication
                  and Key Agreement Protocol Usable in Multi-server Environment},
  journal      = {Wirel. Pers. Commun.},
  volume       = {84},
  number       = {1},
  pages        = {439--462},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11277-015-2616-7},
  doi          = {10.1007/S11277-015-2616-7},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/AminB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cit/KaratiB15,
  author       = {Arijit Karati and
                  G. P. Biswas},
  title        = {Cryptanalysis of Zheng Et al.'s Pairing-Free Secure {IBE} Scheme},
  booktitle    = {2015 International Conference on Information Technology, {ICIT} 2015,
                  Bhubaneswar, India, December 21-23, 2015},
  pages        = {101--106},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICIT.2015.26},
  doi          = {10.1109/ICIT.2015.26},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cit/KaratiB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/AminIBK15,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan},
  title        = {An efficient remote mutual authentication scheme using smart mobile
                  phone over insecure networks},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166114},
  doi          = {10.1109/CYBERSA.2015.7166114},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/AminIBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/KumarAKB15,
  author       = {Rajeev Kumar and
                  Ruhul Amin and
                  Arijit Karati and
                  G. P. Biswas},
  editor       = {Swagatam Das and
                  Tandra Pal and
                  Samarjit Kar and
                  Suresh Chandra Satapathy and
                  Jyotsna Kumar Mandal},
  title        = {Secure Remote Login Scheme with Password and Smart Card Update Facilities},
  booktitle    = {Proceedings of the 4th International Conference on Frontiers in Intelligent
                  Computing: Theory and Applications, {FICTA} 2015, Durgapur, India,
                  16-18 November 2015},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {404},
  pages        = {495--505},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2695-6\_41},
  doi          = {10.1007/978-81-322-2695-6\_41},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ficta/KumarAKB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AminB15,
  author       = {Ruhul Amin and
                  G. P. Biswas},
  title        = {Cryptanalysis of a Markov Chain Based User Authentication Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {656},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/656},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AminB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/RayB14,
  author       = {Sangram Ray and
                  G. P. Biswas},
  title        = {Design of an efficient mobile health system for achieving {HIPAA}
                  privacy-security regulations},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {378--387},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJWMC.2014.063056},
  doi          = {10.1504/IJWMC.2014.063056},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/RayB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/IslamB14,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {A provably secure identity-based strong designated verifier proxy
                  signature scheme from bilinear pairings},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {26},
  number       = {1},
  pages        = {55--67},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jksuci.2013.03.004},
  doi          = {10.1016/J.JKSUCI.2013.03.004},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/IslamB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/IslamB14a,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {Certificateless short sequential and broadcast multisignature schemes
                  using elliptic curve bilinear pairings},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {26},
  number       = {1},
  pages        = {89--97},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jksuci.2013.05.001},
  doi          = {10.1016/J.JKSUCI.2013.05.001},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/IslamB14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/RayB14,
  author       = {Sangram Ray and
                  G. P. Biswas},
  title        = {A Certificate Authority (CA)-based cryptographic solution for {HIPAA}
                  privacy/security regulations},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {26},
  number       = {2},
  pages        = {170--180},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jksuci.2013.10.001},
  doi          = {10.1016/J.JKSUCI.2013.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/RayB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icacci/MalweB14,
  author       = {Shweta R. Malwe and
                  G. P. Biswas},
  title        = {{TCA-PCA} based hybrid code assignment for enhancement and easy deployability
                  of {CDMA} protocol},
  booktitle    = {2014 International Conference on Advances in Computing, Communications
                  and Informatics, {ICACCI} 2014, Delhi, India, September 24-27, 2014},
  pages        = {1395--1401},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICACCI.2014.6968276},
  doi          = {10.1109/ICACCI.2014.6968276},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icacci/MalweB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscit/KumarRB14,
  author       = {Gourav Kumar and
                  Puja Rani and
                  G. P. Biswas},
  title        = {Modification of {AODV} for enhanced data delivery},
  booktitle    = {14th International Symposium on Communications and Information Technologies,
                  {ISCIT} 2014, Incheon, South Korea, September 24-26, 2014},
  pages        = {71--75},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISCIT.2014.7011872},
  doi          = {10.1109/ISCIT.2014.7011872},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iscit/KumarRB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/MalweB14,
  author       = {Shweta R. Malwe and
                  G. P. Biswas},
  editor       = {G. P. Biswas and
                  Sushanta Mukhopadhyay},
  title        = {Dynamic Clustering Based Hybrid Routing Protocol for Mobile Ad Hoc
                  Networks},
  booktitle    = {Recent Advances in Information Technology - {RAIT-2014} Proceedings
                  [Dhanbad, India, 13-15 March, 2014]},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {266},
  pages        = {3--9},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-81-322-1856-2\_1},
  doi          = {10.1007/978-81-322-1856-2\_1},
  timestamp    = {Wed, 24 May 2017 08:29:04 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/MalweB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/MukherjeeB14,
  author       = {Sankar Mukherjee and
                  G. P. Biswas},
  editor       = {G. P. Biswas and
                  Sushanta Mukhopadhyay},
  title        = {Design of Hybrid {MAC} Protocol for Wireless Sensor Network},
  booktitle    = {Recent Advances in Information Technology - {RAIT-2014} Proceedings
                  [Dhanbad, India, 13-15 March, 2014]},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {266},
  pages        = {11--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-81-322-1856-2\_2},
  doi          = {10.1007/978-81-322-1856-2\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/MukherjeeB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/MishraIB14,
  author       = {Manoj K. Mishra and
                  SK Hafizul Islam and
                  G. P. Biswas},
  editor       = {G. P. Biswas and
                  Sushanta Mukhopadhyay},
  title        = {Design of ECC-Based ElGamal Encryption Scheme Using {CL-PKC}},
  booktitle    = {Recent Advances in Information Technology - {RAIT-2014} Proceedings
                  [Dhanbad, India, 13-15 March, 2014]},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {266},
  pages        = {27--34},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-81-322-1856-2\_4},
  doi          = {10.1007/978-81-322-1856-2\_4},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/MishraIB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rait/2014,
  editor       = {G. P. Biswas and
                  Sushanta Mukhopadhyay},
  title        = {Recent Advances in Information Technology - {RAIT-2014} Proceedings
                  [Dhanbad, India, 13-15 March, 2014]},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {266},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-81-322-1856-2},
  doi          = {10.1007/978-81-322-1856-2},
  isbn         = {978-81-322-1855-5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/IslamB13,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {Provably secure and pairing-free certificateless digital signature
                  scheme using elliptic curve cryptography},
  journal      = {Int. J. Comput. Math.},
  volume       = {90},
  number       = {11},
  pages        = {2244--2258},
  year         = {2013},
  url          = {https://doi.org/10.1080/00207160.2013.776674},
  doi          = {10.1080/00207160.2013.776674},
  timestamp    = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/IslamB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/DasguptaBB13,
  author       = {Mou Dasgupta and
                  G. P. Biswas and
                  Chandan Bhar},
  title        = {Design of network topology based on delay-cost sink tree},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {10},
  number       = {2},
  pages        = {146--162},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJCNDS.2013.051834},
  doi          = {10.1504/IJCNDS.2013.051834},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/DasguptaBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/IslamB13,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {Provably secure certificateless strong designated verifier signature
                  scheme based on elliptic curve bilinear pairings},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {25},
  number       = {1},
  pages        = {51--61},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jksuci.2012.06.003},
  doi          = {10.1016/J.JKSUCI.2012.06.003},
  timestamp    = {Fri, 11 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/IslamB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/IslamB13,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {Design of improved password authentication and update scheme based
                  on elliptic curve cryptography},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {11-12},
  pages        = {2703--2717},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2011.07.001},
  doi          = {10.1016/J.MCM.2011.07.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcm/IslamB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/IslamB12,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {A pairing-free identity-based authenticated group key agreement protocol
                  for imbalanced mobile networks},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {67},
  number       = {11-12},
  pages        = {547--558},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12243-012-0296-9},
  doi          = {10.1007/S12243-012-0296-9},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/IslamB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/DasguptaB12,
  author       = {Mou Dasgupta and
                  G. P. Biswas},
  title        = {Design of multi-path data routing algorithm based on network reliability},
  journal      = {Comput. Electr. Eng.},
  volume       = {38},
  number       = {6},
  pages        = {1433--1443},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.compeleceng.2012.04.013},
  doi          = {10.1016/J.COMPELECENG.2012.04.013},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/DasguptaB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccseit/RayB12,
  author       = {Sangram Ray and
                  G. P. Biswas},
  editor       = {Natarajan Meghanathan and
                  Michal Wozniak},
  title        = {An {ECC} based public key infrastructure usable for mobile applications},
  booktitle    = {The Second International Conference on Computational Science, Engineering
                  and Information Technology, {CCSEIT} '12, Coimbatore, India, October
                  26-28, 2012},
  pages        = {562--568},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2393216.2393310},
  doi          = {10.1145/2393216.2393310},
  timestamp    = {Thu, 07 Nov 2019 15:14:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccseit/RayB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icacci/IslamB12,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  editor       = {Kaliappan Gopalan and
                  Sabu M. Thampi},
  title        = {Certificateless strong designated verifier multisignature scheme using
                  bilinear pairings},
  booktitle    = {2012 International Conference on Advances in Computing, Communications
                  and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012},
  pages        = {540--546},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2345396.2345485},
  doi          = {10.1145/2345396.2345485},
  timestamp    = {Sun, 29 Aug 2021 01:08:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icacci/IslamB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/IslamB12,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {Design of an efficient ID-based short designated verifier proxy signature
                  scheme},
  booktitle    = {1st International Conference on Recent Advances in Information Technology,
                  {RAIT} 2012, Dhanbad, India, March 15-17, 2012},
  pages        = {48--53},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/RAIT.2012.6194478},
  doi          = {10.1109/RAIT.2012.6194478},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/IslamB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/DasguptaBB12,
  author       = {Mou Dasgupta and
                  G. P. Biswas and
                  Chandan Bhar},
  title        = {Optimization of multiple objectives and topological design of data
                  networks using genetic algorithm},
  booktitle    = {1st International Conference on Recent Advances in Information Technology,
                  {RAIT} 2012, Dhanbad, India, March 15-17, 2012},
  pages        = {256--262},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/RAIT.2012.6194516},
  doi          = {10.1109/RAIT.2012.6194516},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/DasguptaBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/DholeyB12,
  author       = {Milan Kumar Dholey and
                  G. P. Biswas},
  title        = {Node-blockage reduction and removal of hidden-terminal problem of
                  {CSMA/CA} {MAC} protocol},
  booktitle    = {1st International Conference on Recent Advances in Information Technology,
                  {RAIT} 2012, Dhanbad, India, March 15-17, 2012},
  pages        = {321--324},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/RAIT.2012.6194439},
  doi          = {10.1109/RAIT.2012.6194439},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/DholeyB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/JainB12,
  author       = {Priyam Jain and
                  G. P. Biswas},
  title        = {Design and implementation of an enhanced rate adaptation scheme for
                  wireless {LAN} Ieee-802.11},
  booktitle    = {1st International Conference on Recent Advances in Information Technology,
                  {RAIT} 2012, Dhanbad, India, March 15-17, 2012},
  pages        = {336--340},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/RAIT.2012.6194442},
  doi          = {10.1109/RAIT.2012.6194442},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/JainB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhcr/PandeyB11,
  author       = {Pavan Kumar Pandey and
                  G. P. Biswas},
  title        = {Design and Implementation of Binary Tree Based Proactive Routing Protocols
                  for Large {MANETS}},
  journal      = {Int. J. Handheld Comput. Res.},
  volume       = {2},
  number       = {4},
  pages        = {82--94},
  year         = {2011},
  url          = {https://doi.org/10.4018/jhcr.2011100105},
  doi          = {10.4018/JHCR.2011100105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhcr/PandeyB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Biswas11,
  author       = {G. P. Biswas},
  title        = {Establishment of Authenticated Secret Session Keys Using Digital Signature
                  Standard},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {1},
  pages        = {9--16},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.529101},
  doi          = {10.1080/19393555.2010.529101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Biswas11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/IslamB11,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  title        = {A more efficient and secure ID-based remote mutual authentication
                  with key agreement scheme for mobile devices on elliptic curve cryptosystem},
  journal      = {J. Syst. Softw.},
  volume       = {84},
  number       = {11},
  pages        = {1892--1898},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jss.2011.06.061},
  doi          = {10.1016/J.JSS.2011.06.061},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/IslamB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acc/IslamB11,
  author       = {SK Hafizul Islam and
                  G. P. Biswas},
  editor       = {Ajith Abraham and
                  Jaime Lloret Mauri and
                  John F. Buford and
                  Junichi Suzuki and
                  Sabu M. Thampi},
  title        = {Comments on ID-Based Client Authentication with Key Agreement Protocol
                  on {ECC} for Mobile Client-Server Environment},
  booktitle    = {Advances in Computing and Communications - First International Conference,
                  {ACC} 2011, Kochi, India, July 22-24, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {191},
  pages        = {628--635},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22714-1\_65},
  doi          = {10.1007/978-3-642-22714-1\_65},
  timestamp    = {Mon, 29 May 2017 13:41:41 +0200},
  biburl       = {https://dblp.org/rec/conf/acc/IslamB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/retis/RayB11,
  author       = {Sangram Ray and
                  G. P. Biswas},
  editor       = {Mita Nasipuri and
                  Sarmistha Neogy and
                  Jamuna Kanta Sing and
                  Amit Konar and
                  Ujjwal Maulik and
                  Subhadip Basu and
                  Debasish Jana},
  title        = {Design of Mobile-PKI for using mobile phones in various applications},
  booktitle    = {International Conference on Recent Trends in Information Systems,
                  ReTIS 2011, December 21-23, 2011, Jadavpur University, Kolkata, India,
                  Proceedings},
  pages        = {297--302},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ReTIS.2011.6146885},
  doi          = {10.1109/RETIS.2011.6146885},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/retis/RayB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-7051,
  author       = {Arup Kumar Pal and
                  G. P. Biswas and
                  S. Mukhopadhyay},
  title        = {Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling
                  of Codebook and Index Matrix},
  journal      = {CoRR},
  volume       = {abs/1111.7051},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.7051},
  eprinttype    = {arXiv},
  eprint       = {1111.7051},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-7051.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsde/DasguptaB10,
  author       = {Mou Dasgupta and
                  G. P. Biswas},
  title        = {Approximation of the Node-Pair Reliability of Data Communication Networks},
  booktitle    = {Proceedings of the International Conference on Data Storage and Data
                  Engineering, {DSDE} 2010, Bangalore, India, 9-10 February 2010},
  pages        = {5--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSDE.2010.66},
  doi          = {10.1109/DSDE.2010.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsde/DasguptaB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/PandeyB10,
  author       = {Pavan Kumar Pandey and
                  G. P. Biswas},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli},
  title        = {Design and Implementation of Binary Tree Based Proactive Routing Protocols
                  for Large {MANETS}},
  booktitle    = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN}
                  2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6059},
  pages        = {397--408},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13577-4\_35},
  doi          = {10.1007/978-3-642-13577-4\_35},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/PandeyB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic/TripathiB08,
  author       = {Sachin Tripathi and
                  G. P. Biswas},
  editor       = {Hamid R. Arabnia and
                  Victor A. Clincy},
  title        = {Modification of Channel Based {IP} Multicasting to Support Many to
                  Many Communications},
  booktitle    = {Proceedings of the 2008 International Conference on Internet Computing,
                  {ICOMP} 2008, Las Vegas, Nevada, USA, July 14-17, 2008},
  pages        = {195--199},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Wed, 11 Feb 2009 08:55:37 +0100},
  biburl       = {https://dblp.org/rec/conf/ic/TripathiB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/SikdarPBCBYM00,
  author       = {Biplab K. Sikdar and
                  Kolin Paul and
                  Gosta Pada Biswas and
                  Parimal Pal Chaudhuri and
                  Vamsi Boppana and
                  Cliff Yang and
                  Sobhan Mukherjee},
  title        = {Theory and Application of GF(2p) Cellular Automata as On-chip Test
                  Pattern Generator},
  booktitle    = {13th International Conference on {VLSI} Design {(VLSI} Design 2000),
                  4-7 January 2000, Calcutta, India},
  pages        = {556--561},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICVD.2000.812666},
  doi          = {10.1109/ICVD.2000.812666},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsid/SikdarPBCBYM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/BiswasS97,
  author       = {Gosta Pada Biswas and
                  Idranil Sen Gupta},
  title        = {Design of t-UED/AUED Codes from Berger's {AUED} Code},
  booktitle    = {10th International Conference on {VLSI} Design {(VLSI} Design 1997),
                  4-7 January 1997, Hyderabad, India},
  pages        = {364--369},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ICVD.1997.568154},
  doi          = {10.1109/ICVD.1997.568154},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsid/BiswasS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/BiswasS97a,
  author       = {Gosta Pada Biswas and
                  Indranil Sengupta},
  title        = {A Design Technique of {TSC} Checker for Borden's Code},
  booktitle    = {10th International Conference on {VLSI} Design {(VLSI} Design 1997),
                  4-7 January 1997, Hyderabad, India},
  pages        = {529--530},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ICVD.1997.568199},
  doi          = {10.1109/ICVD.1997.568199},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsid/BiswasS97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ats/BiswasG95,
  author       = {Gosta Pada Biswas and
                  Idranil Sen Gupta},
  title        = {Generalized modular design of testable m-out-of-n code checker},
  booktitle    = {4th Asian Test Symposium {(ATS} '95), November 23-24, 1995. Bangalore,
                  India},
  pages        = {322--326},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/ATS.1995.485355},
  doi          = {10.1109/ATS.1995.485355},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ats/BiswasG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics