Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: G. P. Biswas
@article{DBLP:journals/wpc/AdhikariROB23, author = {Sharmistha Adhikari and Sangram Ray and Mohammad S. Obaidat and G. P. Biswas}, title = {ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet}, journal = {Wirel. Pers. Commun.}, volume = {132}, number = {1}, pages = {571--607}, year = {2023}, url = {https://doi.org/10.1007/s11277-023-10625-8}, doi = {10.1007/S11277-023-10625-8}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/AdhikariROB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KaibarttaBPD21, author = {Tanusree Kaibartta and G. P. Biswas and Arup Kumar Pal and Debesh Kumar Das}, title = {A Genetic Algorithm-Based Metaheuristic Approach for Test Cost Optimization of 3D {SIC}}, journal = {{IEEE} Access}, volume = {9}, pages = {160987--161002}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3131336}, doi = {10.1109/ACCESS.2021.3131336}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KaibarttaBPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KaratiAMSB21, author = {Arijit Karati and Ruhul Amin and Prerna Mohit and Venkatasamy Sureshkumar and G. P. Biswas}, title = {Design of a secure file storage and access protocol for cloud-enabled Internet of Things environment}, journal = {Comput. Electr. Eng.}, volume = {94}, pages = {107298}, year = {2021}, url = {https://doi.org/10.1016/j.compeleceng.2021.107298}, doi = {10.1016/J.COMPELECENG.2021.107298}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/KaratiAMSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/MohitAB21, author = {Prerna Mohit and Ruhul Amin and G. P. Biswas}, title = {An e-healthcare authentication protocol employing cloud computing}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {36}, number = {3}, pages = {155--168}, year = {2021}, url = {https://doi.org/10.1504/IJAHUC.2021.113873}, doi = {10.1504/IJAHUC.2021.113873}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/MohitAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/SadhukhanRBKD21, author = {Dipanwita Sadhukhan and Sangram Ray and G. P. Biswas and Muhammad Khurram Khan and Mou Dasgupta}, title = {A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography}, journal = {J. Supercomput.}, volume = {77}, number = {2}, pages = {1114--1151}, year = {2021}, url = {https://doi.org/10.1007/s11227-020-03318-7}, doi = {10.1007/S11227-020-03318-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/SadhukhanRBKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/AdhikariROB20, author = {Sharmistha Adhikari and Sangram Ray and Mohammad S. Obaidat and G. P. Biswas}, title = {Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure}, journal = {Comput. Commun.}, volume = {157}, pages = {187--203}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.04.024}, doi = {10.1016/J.COMCOM.2020.04.024}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/AdhikariROB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/KaibarttaBD20, author = {Tanusree Kaibartta and G. P. Biswas and Debesh Kumar Das}, title = {Co-Optimization of Test Wrapper Length and {TSV} for {TSV} Based 3D SOCs}, journal = {J. Electron. Test.}, volume = {36}, number = {2}, pages = {239--253}, year = {2020}, url = {https://doi.org/10.1007/s10836-020-05872-7}, doi = {10.1007/S10836-020-05872-7}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/et/KaibarttaBD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ats/KaibarttaBD20, author = {Tanusree Kaibartta and G. P. Biswas and Debesh K. Das}, title = {Heuristic Approach for Identification of Random {TSV} Defects in 3D {IC} During Pre-bond Testing}, booktitle = {29th {IEEE} Asian Test Symposium, {ATS} 2020, Penang, Malaysia, November 23-26, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ATS49688.2020.9301580}, doi = {10.1109/ATS49688.2020.9301580}, timestamp = {Fri, 15 Jan 2021 14:54:20 +0100}, biburl = {https://dblp.org/rec/conf/ats/KaibarttaBD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/MukherjeeGB19, author = {Sankar Mukherjee and Daya Sagar Gupta and G. P. Biswas}, title = {An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice}, journal = {Computing}, volume = {101}, number = {12}, pages = {1763--1788}, year = {2019}, url = {https://doi.org/10.1007/s00607-018-0689-3}, doi = {10.1007/S00607-018-0689-3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/MukherjeeGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/KaratiB19, author = {Arijit Karati and G. P. Biswas}, title = {Provably secure and authenticated data sharing protocol for IoT-based crowdsensing network}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {30}, number = {4}, year = {2019}, url = {https://doi.org/10.1002/ett.3315}, doi = {10.1002/ETT.3315}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/KaratiB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/AdhikariRBO19, author = {Sharmistha Adhikari and Sangram Ray and Gosta Pada Biswas and Mohammad S. Obaidat}, title = {Efficient and secure business model for content centric network using elliptic curve cryptography}, journal = {Int. J. Commun. Syst.}, volume = {32}, number = {1}, year = {2019}, url = {https://doi.org/10.1002/dac.3839}, doi = {10.1002/DAC.3839}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/AdhikariRBO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/MukherjeeAB19, author = {Sankar Mukherjee and Ruhul Amin and G. P. Biswas}, title = {Design of routing protocol for multi-sink based wireless sensor networks}, journal = {Wirel. Networks}, volume = {25}, number = {7}, pages = {4331--4347}, year = {2019}, url = {https://doi.org/10.1007/s11276-019-02095-3}, doi = {10.1007/S11276-019-02095-3}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/MukherjeeAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/AminIBO18, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Mohammad S. Obaidat}, title = {A robust mutual authentication protocol for {WSN} with multiple base-stations}, journal = {Ad Hoc Networks}, volume = {75-76}, pages = {1--18}, year = {2018}, url = {https://doi.org/10.1016/j.adhoc.2018.03.007}, doi = {10.1016/J.ADHOC.2018.03.007}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/AminIBO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/GuptaB18, author = {Daya Sagar Gupta and G. P. Biswas}, title = {Design of lattice-based ElGamal encryption and signature schemes using {SIS} problem}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {29}, number = {6}, year = {2018}, url = {https://doi.org/10.1002/ett.3255}, doi = {10.1002/ETT.3255}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/GuptaB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AminKBIC18, author = {Ruhul Amin and Neeraj Kumar and G. P. Biswas and Rahat Iqbal and Victor I. Chang}, title = {A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {1005--1019}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.12.028}, doi = {10.1016/J.FUTURE.2016.12.028}, timestamp = {Sat, 17 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AminKBIC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AminIBKK18, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Neeraj Kumar}, title = {A robust and anonymous patient monitoring system using wireless medical sensor networks}, journal = {Future Gener. Comput. Syst.}, volume = {80}, pages = {483--495}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.05.032}, doi = {10.1016/J.FUTURE.2016.05.032}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AminIBKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/GuptaB18, author = {Daya Sagar Gupta and G. P. Biswas}, title = {A novel and efficient lattice-based authenticated key exchange protocol in {C-K} model}, journal = {Int. J. Commun. Syst.}, volume = {31}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/dac.3473}, doi = {10.1002/DAC.3473}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/GuptaB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KaratiIBBVK18, author = {Arijit Karati and SK Hafizul Islam and G. P. Biswas and Md. Zakirul Alam Bhuiyan and Pandi Vijayakumar and Marimuthu Karuppiah}, title = {Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {4}, pages = {2904--2914}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2017.2741580}, doi = {10.1109/JIOT.2017.2741580}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/KaratiIBBVK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/KaratiIB18, author = {Arijit Karati and SK Hafizul Islam and G. P. Biswas}, title = {A pairing-free and provably secure certificateless signature scheme}, journal = {Inf. Sci.}, volume = {450}, pages = {378--391}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.03.053}, doi = {10.1016/J.INS.2018.03.053}, timestamp = {Fri, 01 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/KaratiIB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/MukherjeeB18, author = {Sankar Mukherjee and G. P. Biswas}, title = {Location estimation based routing for mobile adhoc network}, journal = {J. Intell. Fuzzy Syst.}, volume = {35}, number = {2}, pages = {1209--1224}, year = {2018}, url = {https://doi.org/10.3233/JIFS-169666}, doi = {10.3233/JIFS-169666}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/MukherjeeB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/BanerjeeGB18, author = {Shalini Banerjee and Daya Sagar Gupta and G. P. Biswas}, title = {Hierarchy-based cheating detection and cheater identification in secret sharing schemes}, booktitle = {2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 15-17, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/RAIT.2018.8389094}, doi = {10.1109/RAIT.2018.8389094}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rait/BanerjeeGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/GuptaBN18, author = {Daya Sagar Gupta and G. P. Biswas and Roushan Nandan}, title = {Security weakness of a lattice-based key exchange protocol}, booktitle = {2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 15-17, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/RAIT.2018.8389018}, doi = {10.1109/RAIT.2018.8389018}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rait/GuptaBN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbdcn/MohitB17, author = {Prerna Mohit and G. P. Biswas}, title = {Modification of Traditional {RSA} into Symmetric-RSA Cryptosystems}, journal = {Int. J. Bus. Data Commun. Netw.}, volume = {13}, number = {1}, pages = {66--73}, year = {2017}, url = {https://doi.org/10.4018/IJBDCN.2017010106}, doi = {10.4018/IJBDCN.2017010106}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbdcn/MohitB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/IslamFBKO17, author = {SK Hafizul Islam and Mohammad Sabzinejad Farash and G. P. Biswas and Muhammad Khurram Khan and Mohammad S. Obaidat}, title = {A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography}, journal = {Int. J. Comput. Math.}, volume = {94}, number = {1}, pages = {39--55}, year = {2017}, url = {https://doi.org/10.1080/00207160.2015.1088148}, doi = {10.1080/00207160.2015.1088148}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/IslamFBKO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/AminIOBH17, author = {Ruhul Amin and SK Hafizul Islam and Mohammad S. Obaidat and G. P. Biswas and Kuei{-}Fang Hsiao}, title = {An anonymous and robust multi-server authentication protocol using multiple registration servers}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {18}, year = {2017}, url = {https://doi.org/10.1002/dac.3457}, doi = {10.1002/DAC.3457}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcomsys/AminIOBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/GuptaB17, author = {Daya Sagar Gupta and G. P. Biswas}, title = {An ECC-based authenticated group key exchange protocol in {IBE} framework}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {18}, year = {2017}, url = {https://doi.org/10.1002/dac.3363}, doi = {10.1002/DAC.3363}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/GuptaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/GuptaB17, author = {Daya Sagar Gupta and G. P. Biswas}, title = {A Secure Cloud Storage using ECC-Based Homomorphic Encryption}, journal = {Int. J. Inf. Secur. Priv.}, volume = {11}, number = {3}, pages = {54--62}, year = {2017}, url = {https://doi.org/10.4018/IJISP.2017070105}, doi = {10.4018/IJISP.2017070105}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/GuptaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/IslamB17, author = {SK Hafizul Islam and G. P. Biswas}, title = {A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {29}, number = {1}, pages = {63--73}, year = {2017}, url = {https://doi.org/10.1016/j.jksuci.2015.01.004}, doi = {10.1016/J.JKSUCI.2015.01.004}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/IslamB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/IslamABF0K17, author = {SK Hafizul Islam and Ruhul Amin and G. P. Biswas and Mohammad Sabzinejad Farash and Xiong Li and Saru Kumari}, title = {An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {29}, number = {3}, pages = {311--324}, year = {2017}, url = {https://doi.org/10.1016/j.jksuci.2015.08.002}, doi = {10.1016/J.JKSUCI.2015.08.002}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/IslamABF0K17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/MohitAKBK17, author = {Prerna Mohit and Ruhul Amin and Arijit Karati and G. P. Biswas and Muhammad Khurram Khan}, title = {A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System}, journal = {J. Medical Syst.}, volume = {41}, number = {4}, pages = {50:1--50:13}, year = {2017}, url = {https://doi.org/10.1007/s10916-017-0699-2}, doi = {10.1007/S10916-017-0699-2}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/MohitAKBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/MohitAB17, author = {Prerna Mohit and Ruhul Amin and G. P. Biswas}, title = {Design of authentication protocol for wireless sensor network-based smart vehicular system}, journal = {Veh. Commun.}, volume = {9}, pages = {64--71}, year = {2017}, url = {https://doi.org/10.1016/j.vehcom.2017.02.006}, doi = {10.1016/J.VEHCOM.2017.02.006}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vcomm/MohitAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/GuptaB17, author = {Daya Sagar Gupta and G. P. Biswas}, title = {On Securing Bi- and Tri-partite Session Key Agreement Protocol Using {IBE} Framework}, journal = {Wirel. Pers. Commun.}, volume = {96}, number = {3}, pages = {4505--4524}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4399-5}, doi = {10.1007/S11277-017-4399-5}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/GuptaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MalweTB17, author = {Shweta R. Malwe and Naman Taneja and G. P. Biswas}, title = {Enhancement of {DSR} and {AODV} Protocols Using Link Availability Prediction}, journal = {Wirel. Pers. Commun.}, volume = {97}, number = {3}, pages = {4451--4466}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4733-y}, doi = {10.1007/S11277-017-4733-Y}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MalweTB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmc2/MohitAB17, author = {Prerna Mohit and Ruhul Amin and G. P. Biswas}, editor = {Debasis Giri and Ram N. Mohapatra and Heinrich Begehr and Mohammad S. Obaidat}, title = {Design of Secure and Efficient Electronic Payment System for Mobile Users}, booktitle = {Mathematics and Computing - Third International Conference, {ICMC} 2017, Haldia, India, January 17-21, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {655}, pages = {34--43}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-4642-1\_4}, doi = {10.1007/978-981-10-4642-1\_4}, timestamp = {Mon, 11 Mar 2019 12:15:04 +0100}, biburl = {https://dblp.org/rec/conf/icmc2/MohitAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/AminB16, author = {Ruhul Amin and G. P. Biswas}, title = {A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {36}, pages = {58--80}, year = {2016}, url = {https://doi.org/10.1016/j.adhoc.2015.05.020}, doi = {10.1016/J.ADHOC.2015.05.020}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/AminB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/MalweB16, author = {Shweta R. Malwe and G. P. Biswas}, title = {Analysis and enhancement of pair-wise code assignment scheme used in Code Division Multiple Access protocol}, journal = {Comput. Electr. Eng.}, volume = {56}, pages = {157--170}, year = {2016}, url = {https://doi.org/10.1016/j.compeleceng.2015.10.004}, doi = {10.1016/J.COMPELECENG.2015.10.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/MalweB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AminIBKLK16, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Lu Leng and Neeraj Kumar}, title = {Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks}, journal = {Comput. Networks}, volume = {101}, pages = {42--62}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.01.006}, doi = {10.1016/J.COMNET.2016.01.006}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AminIBKLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/MalweB16, author = {Shweta R. Malwe and G. P. Biswas}, title = {Routing and {CDMA-MAC} based cross-layering for wireless ad hoc networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {21}, number = {4}, pages = {245--258}, year = {2016}, url = {https://doi.org/10.1504/IJAHUC.2016.076368}, doi = {10.1504/IJAHUC.2016.076368}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/MalweB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KaratiB16, author = {Arijit Karati and G. P. Biswas}, title = {Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme}, journal = {Secur. Commun. Networks}, volume = {9}, number = {17}, pages = {4060--4074}, year = {2016}, url = {https://doi.org/10.1002/sec.1588}, doi = {10.1002/SEC.1588}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KaratiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AminIBGKK16, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Debasis Giri and Muhammad Khurram Khan and Neeraj Kumar}, title = {A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments}, journal = {Secur. Commun. Networks}, volume = {9}, number = {17}, pages = {4650--4666}, year = {2016}, url = {https://doi.org/10.1002/sec.1655}, doi = {10.1002/SEC.1655}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/AminIBGKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/RayBD16, author = {Sangram Ray and G. P. Biswas and Mou Dasgupta}, title = {Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography}, journal = {Wirel. Pers. Commun.}, volume = {90}, number = {3}, pages = {1331--1354}, year = {2016}, url = {https://doi.org/10.1007/s11277-016-3393-7}, doi = {10.1007/S11277-016-3393-7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/RayBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/MohitB16, author = {Prerna Mohit and G. P. Biswas}, editor = {Suresh Chandra Satapathy and Vikrant Bhateja and Siba K. Udgata and Prasant Kumar Pattnaik}, title = {Confidentiality and Storage of Data in Cloud Environment}, booktitle = {Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications - {FICTA} 2016, Bhubaneswar, Odisa, India, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {516}, pages = {289--295}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3156-4\_29}, doi = {10.1007/978-981-10-3156-4\_29}, timestamp = {Wed, 19 May 2021 13:26:07 +0200}, biburl = {https://dblp.org/rec/conf/ficta/MohitB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/BiswasMB16, author = {Anindya Kumar Biswas and S. Mukhopadhyay and G. P. Biswas}, editor = {Suresh Chandra Satapathy and Vikrant Bhateja and Siba K. Udgata and Prasant Kumar Pattnaik}, title = {Design of Visual Cryptography Scheme Using C(m, w) Combinations}, booktitle = {Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications - {FICTA} 2016, Bhubaneswar, Odisa, India, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {516}, pages = {447--455}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3156-4\_46}, doi = {10.1007/978-981-10-3156-4\_46}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ficta/BiswasMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/KaratiB16, author = {Arijit Karati and G. P. Biswas}, title = {A practical identity based signcryption scheme from bilinear pairing}, booktitle = {2016 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} 2016, Jaipur, India, September 21-24, 2016}, pages = {832--836}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICACCI.2016.7732149}, doi = {10.1109/ICACCI.2016.7732149}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icacci/KaratiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictcs2/MohitB16, author = {Prerna Mohit and G. P. Biswas}, title = {Modification of Symmetric-Key {DES} into Efficient Asymmetric-Key {DES} using {RSA}}, booktitle = {{ICTCS}}, pages = {136:1--136:5}, year = {2016}, url = {https://doi.org/10.1145/2905055.2905352}, doi = {10.1145/2905055.2905352}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictcs2/MohitB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/MalweRB16, author = {Shweta R. Malwe and Soniya Rohilla and G. P. Biswas}, title = {Location and selective-bordercast based enhancement of zone routing protocol}, booktitle = {2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 3-5, 2016}, pages = {83--88}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/RAIT.2016.7507880}, doi = {10.1109/RAIT.2016.7507880}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/rait/MalweRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/TiwariPB16, author = {Minu Tiwari and Soumyashree S. Panda and G. P. Biswas}, title = {An improved secure remote login protocol with three-factor authentication}, booktitle = {2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 3-5, 2016}, pages = {372--378}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/RAIT.2016.7507932}, doi = {10.1109/RAIT.2016.7507932}, timestamp = {Thu, 07 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rait/TiwariPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/GuptaMKAB16, author = {Anurag Gupta and Prema Mohit and Arijit Karati and Ruhul Amin and G. P. Biswas}, title = {Malicious node detection using ID-based authentication technique}, booktitle = {2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 3-5, 2016}, pages = {398--403}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/RAIT.2016.7507935}, doi = {10.1109/RAIT.2016.7507935}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rait/GuptaMKAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/AminIKB16, author = {Ruhul Amin and SK Hafizul Islam and Arijit Karati and G. P. Biswas}, title = {Design of an enhanced authentication protocol and its verification using {AVISPA}}, booktitle = {2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 3-5, 2016}, pages = {404--409}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/RAIT.2016.7507936}, doi = {10.1109/RAIT.2016.7507936}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rait/AminIKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcit-igi/GuptaB15, author = {Daya Sagar Gupta and G. P. Biswas}, title = {Secure Computation on Cloud Storage: {A} Homomorphic Approach}, journal = {J. Cases Inf. Technol.}, volume = {17}, number = {3}, pages = {22--29}, year = {2015}, url = {https://doi.org/10.4018/JCIT.2015070103}, doi = {10.4018/JCIT.2015070103}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcit-igi/GuptaB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/IslamB15, author = {SK Hafizul Islam and G. P. Biswas}, title = {Cryptanalysis and improvement of a password-based user authentication scheme for the integrated {EPR} information system}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {27}, number = {2}, pages = {211--221}, year = {2015}, url = {https://doi.org/10.1016/j.jksuci.2014.03.018}, doi = {10.1016/J.JKSUCI.2014.03.018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/IslamB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/AminB15, author = {Ruhul Amin and G. P. Biswas}, title = {A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in {TMIS}}, journal = {J. Medical Syst.}, volume = {39}, number = {3}, pages = {33}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0217-3}, doi = {10.1007/S10916-015-0217-3}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/AminB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/AminB15a, author = {Ruhul Amin and G. P. Biswas}, title = {A Secure Three-Factor User Authentication and Key Agreement Protocol for {TMIS} With User Anonymity}, journal = {J. Medical Syst.}, volume = {39}, number = {8}, pages = {78}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0258-7}, doi = {10.1007/S10916-015-0258-7}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/AminB15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/AminB15b, author = {Ruhul Amin and G. P. Biswas}, title = {An Improved {RSA} Based User Authentication and Session Key Agreement Protocol Usable in {TMIS}}, journal = {J. Medical Syst.}, volume = {39}, number = {8}, pages = {79}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0262-y}, doi = {10.1007/S10916-015-0262-Y}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/AminB15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/AminIBKO15, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Mohammad S. Obaidat}, title = {Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System}, journal = {J. Medical Syst.}, volume = {39}, number = {11}, pages = {137:1--137:20}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0307-2}, doi = {10.1007/S10916-015-0307-2}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/AminIBKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/AminIBKL15, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Xiong Li}, title = {Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems}, journal = {J. Medical Syst.}, volume = {39}, number = {11}, pages = {140:1--140:21}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0318-z}, doi = {10.1007/S10916-015-0318-Z}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/AminIBKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/AminIBKK15, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Neeraj Kumar}, title = {An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for {TMIS} using Elliptic Curve Cryptography}, journal = {J. Medical Syst.}, volume = {39}, number = {11}, pages = {180}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0351-y}, doi = {10.1007/S10916-015-0351-Y}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/AminIBKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/IslamB15, author = {SK Hafizul Islam and G. P. Biswas}, title = {Design of Two-Party Authenticated Key Agreement Protocol Based on {ECC} and Self-Certified Public Keys}, journal = {Wirel. Pers. Commun.}, volume = {82}, number = {4}, pages = {2727--2750}, year = {2015}, url = {https://doi.org/10.1007/s11277-015-2375-5}, doi = {10.1007/S11277-015-2375-5}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/IslamB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/AminB15, author = {Ruhul Amin and G. P. Biswas}, title = {Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment}, journal = {Wirel. Pers. Commun.}, volume = {84}, number = {1}, pages = {439--462}, year = {2015}, url = {https://doi.org/10.1007/s11277-015-2616-7}, doi = {10.1007/S11277-015-2616-7}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/AminB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cit/KaratiB15, author = {Arijit Karati and G. P. Biswas}, title = {Cryptanalysis of Zheng Et al.'s Pairing-Free Secure {IBE} Scheme}, booktitle = {2015 International Conference on Information Technology, {ICIT} 2015, Bhubaneswar, India, December 21-23, 2015}, pages = {101--106}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICIT.2015.26}, doi = {10.1109/ICIT.2015.26}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/cit/KaratiB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersa/AminIBK15, author = {Ruhul Amin and SK Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan}, title = {An efficient remote mutual authentication scheme using smart mobile phone over insecure networks}, booktitle = {2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CyberSA.2015.7166114}, doi = {10.1109/CYBERSA.2015.7166114}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersa/AminIBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/KumarAKB15, author = {Rajeev Kumar and Ruhul Amin and Arijit Karati and G. P. Biswas}, editor = {Swagatam Das and Tandra Pal and Samarjit Kar and Suresh Chandra Satapathy and Jyotsna Kumar Mandal}, title = {Secure Remote Login Scheme with Password and Smart Card Update Facilities}, booktitle = {Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, {FICTA} 2015, Durgapur, India, 16-18 November 2015}, series = {Advances in Intelligent Systems and Computing}, volume = {404}, pages = {495--505}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2695-6\_41}, doi = {10.1007/978-81-322-2695-6\_41}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ficta/KumarAKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AminB15, author = {Ruhul Amin and G. P. Biswas}, title = {Cryptanalysis of a Markov Chain Based User Authentication Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {656}, year = {2015}, url = {http://eprint.iacr.org/2015/656}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AminB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/RayB14, author = {Sangram Ray and G. P. Biswas}, title = {Design of an efficient mobile health system for achieving {HIPAA} privacy-security regulations}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {7}, number = {4}, pages = {378--387}, year = {2014}, url = {https://doi.org/10.1504/IJWMC.2014.063056}, doi = {10.1504/IJWMC.2014.063056}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/RayB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/IslamB14, author = {SK Hafizul Islam and G. P. Biswas}, title = {A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {26}, number = {1}, pages = {55--67}, year = {2014}, url = {https://doi.org/10.1016/j.jksuci.2013.03.004}, doi = {10.1016/J.JKSUCI.2013.03.004}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/IslamB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/IslamB14a, author = {SK Hafizul Islam and G. P. Biswas}, title = {Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {26}, number = {1}, pages = {89--97}, year = {2014}, url = {https://doi.org/10.1016/j.jksuci.2013.05.001}, doi = {10.1016/J.JKSUCI.2013.05.001}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/IslamB14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/RayB14, author = {Sangram Ray and G. P. Biswas}, title = {A Certificate Authority (CA)-based cryptographic solution for {HIPAA} privacy/security regulations}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {26}, number = {2}, pages = {170--180}, year = {2014}, url = {https://doi.org/10.1016/j.jksuci.2013.10.001}, doi = {10.1016/J.JKSUCI.2013.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/RayB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/MalweB14, author = {Shweta R. Malwe and G. P. Biswas}, title = {{TCA-PCA} based hybrid code assignment for enhancement and easy deployability of {CDMA} protocol}, booktitle = {2014 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} 2014, Delhi, India, September 24-27, 2014}, pages = {1395--1401}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICACCI.2014.6968276}, doi = {10.1109/ICACCI.2014.6968276}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icacci/MalweB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscit/KumarRB14, author = {Gourav Kumar and Puja Rani and G. P. Biswas}, title = {Modification of {AODV} for enhanced data delivery}, booktitle = {14th International Symposium on Communications and Information Technologies, {ISCIT} 2014, Incheon, South Korea, September 24-26, 2014}, pages = {71--75}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISCIT.2014.7011872}, doi = {10.1109/ISCIT.2014.7011872}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iscit/KumarRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/MalweB14, author = {Shweta R. Malwe and G. P. Biswas}, editor = {G. P. Biswas and Sushanta Mukhopadhyay}, title = {Dynamic Clustering Based Hybrid Routing Protocol for Mobile Ad Hoc Networks}, booktitle = {Recent Advances in Information Technology - {RAIT-2014} Proceedings [Dhanbad, India, 13-15 March, 2014]}, series = {Advances in Intelligent Systems and Computing}, volume = {266}, pages = {3--9}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1856-2\_1}, doi = {10.1007/978-81-322-1856-2\_1}, timestamp = {Wed, 24 May 2017 08:29:04 +0200}, biburl = {https://dblp.org/rec/conf/rait/MalweB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/MukherjeeB14, author = {Sankar Mukherjee and G. P. Biswas}, editor = {G. P. Biswas and Sushanta Mukhopadhyay}, title = {Design of Hybrid {MAC} Protocol for Wireless Sensor Network}, booktitle = {Recent Advances in Information Technology - {RAIT-2014} Proceedings [Dhanbad, India, 13-15 March, 2014]}, series = {Advances in Intelligent Systems and Computing}, volume = {266}, pages = {11--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1856-2\_2}, doi = {10.1007/978-81-322-1856-2\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rait/MukherjeeB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/MishraIB14, author = {Manoj K. Mishra and SK Hafizul Islam and G. P. Biswas}, editor = {G. P. Biswas and Sushanta Mukhopadhyay}, title = {Design of ECC-Based ElGamal Encryption Scheme Using {CL-PKC}}, booktitle = {Recent Advances in Information Technology - {RAIT-2014} Proceedings [Dhanbad, India, 13-15 March, 2014]}, series = {Advances in Intelligent Systems and Computing}, volume = {266}, pages = {27--34}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1856-2\_4}, doi = {10.1007/978-81-322-1856-2\_4}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rait/MishraIB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rait/2014, editor = {G. P. Biswas and Sushanta Mukhopadhyay}, title = {Recent Advances in Information Technology - {RAIT-2014} Proceedings [Dhanbad, India, 13-15 March, 2014]}, series = {Advances in Intelligent Systems and Computing}, volume = {266}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1856-2}, doi = {10.1007/978-81-322-1856-2}, isbn = {978-81-322-1855-5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rait/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/IslamB13, author = {SK Hafizul Islam and G. P. Biswas}, title = {Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography}, journal = {Int. J. Comput. Math.}, volume = {90}, number = {11}, pages = {2244--2258}, year = {2013}, url = {https://doi.org/10.1080/00207160.2013.776674}, doi = {10.1080/00207160.2013.776674}, timestamp = {Fri, 15 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/IslamB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/DasguptaBB13, author = {Mou Dasgupta and G. P. Biswas and Chandan Bhar}, title = {Design of network topology based on delay-cost sink tree}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {10}, number = {2}, pages = {146--162}, year = {2013}, url = {https://doi.org/10.1504/IJCNDS.2013.051834}, doi = {10.1504/IJCNDS.2013.051834}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/DasguptaBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/IslamB13, author = {SK Hafizul Islam and G. P. Biswas}, title = {Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {25}, number = {1}, pages = {51--61}, year = {2013}, url = {https://doi.org/10.1016/j.jksuci.2012.06.003}, doi = {10.1016/J.JKSUCI.2012.06.003}, timestamp = {Fri, 11 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/IslamB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/IslamB13, author = {SK Hafizul Islam and G. P. Biswas}, title = {Design of improved password authentication and update scheme based on elliptic curve cryptography}, journal = {Math. Comput. Model.}, volume = {57}, number = {11-12}, pages = {2703--2717}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2011.07.001}, doi = {10.1016/J.MCM.2011.07.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mcm/IslamB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/IslamB12, author = {SK Hafizul Islam and G. P. Biswas}, title = {A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {67}, number = {11-12}, pages = {547--558}, year = {2012}, url = {https://doi.org/10.1007/s12243-012-0296-9}, doi = {10.1007/S12243-012-0296-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/IslamB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/DasguptaB12, author = {Mou Dasgupta and G. P. Biswas}, title = {Design of multi-path data routing algorithm based on network reliability}, journal = {Comput. Electr. Eng.}, volume = {38}, number = {6}, pages = {1433--1443}, year = {2012}, url = {https://doi.org/10.1016/j.compeleceng.2012.04.013}, doi = {10.1016/J.COMPELECENG.2012.04.013}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/DasguptaB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccseit/RayB12, author = {Sangram Ray and G. P. Biswas}, editor = {Natarajan Meghanathan and Michal Wozniak}, title = {An {ECC} based public key infrastructure usable for mobile applications}, booktitle = {The Second International Conference on Computational Science, Engineering and Information Technology, {CCSEIT} '12, Coimbatore, India, October 26-28, 2012}, pages = {562--568}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2393216.2393310}, doi = {10.1145/2393216.2393310}, timestamp = {Thu, 07 Nov 2019 15:14:46 +0100}, biburl = {https://dblp.org/rec/conf/ccseit/RayB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/IslamB12, author = {SK Hafizul Islam and G. P. Biswas}, editor = {Kaliappan Gopalan and Sabu M. Thampi}, title = {Certificateless strong designated verifier multisignature scheme using bilinear pairings}, booktitle = {2012 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012}, pages = {540--546}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2345396.2345485}, doi = {10.1145/2345396.2345485}, timestamp = {Sun, 29 Aug 2021 01:08:46 +0200}, biburl = {https://dblp.org/rec/conf/icacci/IslamB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/IslamB12, author = {SK Hafizul Islam and G. P. Biswas}, title = {Design of an efficient ID-based short designated verifier proxy signature scheme}, booktitle = {1st International Conference on Recent Advances in Information Technology, {RAIT} 2012, Dhanbad, India, March 15-17, 2012}, pages = {48--53}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/RAIT.2012.6194478}, doi = {10.1109/RAIT.2012.6194478}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/rait/IslamB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/DasguptaBB12, author = {Mou Dasgupta and G. P. Biswas and Chandan Bhar}, title = {Optimization of multiple objectives and topological design of data networks using genetic algorithm}, booktitle = {1st International Conference on Recent Advances in Information Technology, {RAIT} 2012, Dhanbad, India, March 15-17, 2012}, pages = {256--262}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/RAIT.2012.6194516}, doi = {10.1109/RAIT.2012.6194516}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rait/DasguptaBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/DholeyB12, author = {Milan Kumar Dholey and G. P. Biswas}, title = {Node-blockage reduction and removal of hidden-terminal problem of {CSMA/CA} {MAC} protocol}, booktitle = {1st International Conference on Recent Advances in Information Technology, {RAIT} 2012, Dhanbad, India, March 15-17, 2012}, pages = {321--324}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/RAIT.2012.6194439}, doi = {10.1109/RAIT.2012.6194439}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rait/DholeyB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/JainB12, author = {Priyam Jain and G. P. Biswas}, title = {Design and implementation of an enhanced rate adaptation scheme for wireless {LAN} Ieee-802.11}, booktitle = {1st International Conference on Recent Advances in Information Technology, {RAIT} 2012, Dhanbad, India, March 15-17, 2012}, pages = {336--340}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/RAIT.2012.6194442}, doi = {10.1109/RAIT.2012.6194442}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rait/JainB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhcr/PandeyB11, author = {Pavan Kumar Pandey and G. P. Biswas}, title = {Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large {MANETS}}, journal = {Int. J. Handheld Comput. Res.}, volume = {2}, number = {4}, pages = {82--94}, year = {2011}, url = {https://doi.org/10.4018/jhcr.2011100105}, doi = {10.4018/JHCR.2011100105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhcr/PandeyB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Biswas11, author = {G. P. Biswas}, title = {Establishment of Authenticated Secret Session Keys Using Digital Signature Standard}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {1}, pages = {9--16}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.529101}, doi = {10.1080/19393555.2010.529101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Biswas11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/IslamB11, author = {SK Hafizul Islam and G. P. Biswas}, title = {A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem}, journal = {J. Syst. Softw.}, volume = {84}, number = {11}, pages = {1892--1898}, year = {2011}, url = {https://doi.org/10.1016/j.jss.2011.06.061}, doi = {10.1016/J.JSS.2011.06.061}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/IslamB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acc/IslamB11, author = {SK Hafizul Islam and G. P. Biswas}, editor = {Ajith Abraham and Jaime Lloret Mauri and John F. Buford and Junichi Suzuki and Sabu M. Thampi}, title = {Comments on ID-Based Client Authentication with Key Agreement Protocol on {ECC} for Mobile Client-Server Environment}, booktitle = {Advances in Computing and Communications - First International Conference, {ACC} 2011, Kochi, India, July 22-24, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {191}, pages = {628--635}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22714-1\_65}, doi = {10.1007/978-3-642-22714-1\_65}, timestamp = {Mon, 29 May 2017 13:41:41 +0200}, biburl = {https://dblp.org/rec/conf/acc/IslamB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/retis/RayB11, author = {Sangram Ray and G. P. Biswas}, editor = {Mita Nasipuri and Sarmistha Neogy and Jamuna Kanta Sing and Amit Konar and Ujjwal Maulik and Subhadip Basu and Debasish Jana}, title = {Design of Mobile-PKI for using mobile phones in various applications}, booktitle = {International Conference on Recent Trends in Information Systems, ReTIS 2011, December 21-23, 2011, Jadavpur University, Kolkata, India, Proceedings}, pages = {297--302}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ReTIS.2011.6146885}, doi = {10.1109/RETIS.2011.6146885}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/retis/RayB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-7051, author = {Arup Kumar Pal and G. P. Biswas and S. Mukhopadhyay}, title = {Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling of Codebook and Index Matrix}, journal = {CoRR}, volume = {abs/1111.7051}, year = {2011}, url = {http://arxiv.org/abs/1111.7051}, eprinttype = {arXiv}, eprint = {1111.7051}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-7051.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsde/DasguptaB10, author = {Mou Dasgupta and G. P. Biswas}, title = {Approximation of the Node-Pair Reliability of Data Communication Networks}, booktitle = {Proceedings of the International Conference on Data Storage and Data Engineering, {DSDE} 2010, Bangalore, India, 9-10 February 2010}, pages = {5--9}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DSDE.2010.66}, doi = {10.1109/DSDE.2010.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsde/DasguptaB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/PandeyB10, author = {Pavan Kumar Pandey and G. P. Biswas}, editor = {Tai{-}Hoon Kim and Hojjat Adeli}, title = {Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large {MANETS}}, booktitle = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN} 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6059}, pages = {397--408}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13577-4\_35}, doi = {10.1007/978-3-642-13577-4\_35}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/PandeyB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic/TripathiB08, author = {Sachin Tripathi and G. P. Biswas}, editor = {Hamid R. Arabnia and Victor A. Clincy}, title = {Modification of Channel Based {IP} Multicasting to Support Many to Many Communications}, booktitle = {Proceedings of the 2008 International Conference on Internet Computing, {ICOMP} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {195--199}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Wed, 11 Feb 2009 08:55:37 +0100}, biburl = {https://dblp.org/rec/conf/ic/TripathiB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/SikdarPBCBYM00, author = {Biplab K. Sikdar and Kolin Paul and Gosta Pada Biswas and Parimal Pal Chaudhuri and Vamsi Boppana and Cliff Yang and Sobhan Mukherjee}, title = {Theory and Application of GF(2p) Cellular Automata as On-chip Test Pattern Generator}, booktitle = {13th International Conference on {VLSI} Design {(VLSI} Design 2000), 4-7 January 2000, Calcutta, India}, pages = {556--561}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICVD.2000.812666}, doi = {10.1109/ICVD.2000.812666}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vlsid/SikdarPBCBYM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/BiswasS97, author = {Gosta Pada Biswas and Idranil Sen Gupta}, title = {Design of t-UED/AUED Codes from Berger's {AUED} Code}, booktitle = {10th International Conference on {VLSI} Design {(VLSI} Design 1997), 4-7 January 1997, Hyderabad, India}, pages = {364--369}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ICVD.1997.568154}, doi = {10.1109/ICVD.1997.568154}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vlsid/BiswasS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/BiswasS97a, author = {Gosta Pada Biswas and Indranil Sengupta}, title = {A Design Technique of {TSC} Checker for Borden's Code}, booktitle = {10th International Conference on {VLSI} Design {(VLSI} Design 1997), 4-7 January 1997, Hyderabad, India}, pages = {529--530}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ICVD.1997.568199}, doi = {10.1109/ICVD.1997.568199}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vlsid/BiswasS97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ats/BiswasG95, author = {Gosta Pada Biswas and Idranil Sen Gupta}, title = {Generalized modular design of testable m-out-of-n code checker}, booktitle = {4th Asian Test Symposium {(ATS} '95), November 23-24, 1995. Bangalore, India}, pages = {322--326}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/ATS.1995.485355}, doi = {10.1109/ATS.1995.485355}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ats/BiswasG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.