Adrijit Goswami
According to our database1,
Adrijit Goswami
authored at least 49 papers
between 2006 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2020
Optimization of vehicle speed for batches to minimize supply chain cost under uncertain demand.
Inf. Sci., 2020
2019
J. Intell. Fuzzy Syst., 2019
Nonlinear Triangular Intuitionistic Fuzzy Number and Its Application in Linear Integral Equation.
Adv. Fuzzy Syst., 2019
2018
Vendor-buyer integrated production-inventory system for imperfect quality item under trade credit finance and variable setup cost.
RAIRO Oper. Res., 2018
Proceedings of the Mathematics and Computing - 4th International Conference, 2018
2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017
Designing multi-period supply chain network considering risk and emission: a multi-objective approach.
Ann. Oper. Res., 2017
2016
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.
IEEE Trans. Consumer Electron., 2016
An improved inventory model with random review period and temporary price discount for deteriorating items.
Int. J. Syst. Assur. Eng. Manag., 2016
A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2016
Two-echelon fuzzy stochastic supply chain for the manufacturer-buyer integrated production-inventory system.
J. Intell. Manuf., 2016
A secure and efficient time-bound hierarchical access control scheme for secure broadcasting.
Int. J. Ad Hoc Ubiquitous Comput., 2016
Multi-objective modeling of production and pollution routing problem with time window: A self-learning particle swarm optimization approach.
Comput. Ind. Eng., 2016
Appl. Intell., 2016
2015
Wirel. Pers. Commun., 2015
An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems.
Wirel. Pers. Commun., 2015
DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks.
Wirel. Pers. Commun., 2015
IEEE Trans. Inf. Forensics Secur., 2015
An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.
Secur. Commun. Networks, 2015
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks.
Secur. Commun. Networks, 2015
Knowl. Inf. Syst., 2015
A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.
J. Medical Syst., 2015
A robust anonymous biometric-based remote user authentication scheme using smart cards.
J. King Saud Univ. Comput. Inf. Sci., 2015
An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card.
J. Inf. Secur. Appl., 2015
EPQ model with learning consideration, imperfect production and partial backlogging in fuzzy random environment.
Int. J. Syst. Sci., 2015
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices.
IACR Cryptol. ePrint Arch., 2015
Expert Syst. Appl., 2015
A continuous review production-inventory system in fuzzy random environment: Minmax distribution free procedure.
Comput. Ind. Eng., 2015
A fuzzy random EPQ model for imperfect quality items with possibility and necessity constraints.
Appl. Soft Comput., 2015
2014
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function.
J. Medical Syst., 2014
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy.
Inf. Sci., 2014
An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function.
Int. J. Commun. Networks Distributed Syst., 2014
Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'.
IACR Cryptol. ePrint Arch., 2014
An interpolating by pass to Pareto optimality in intuitionistic fuzzy technique for a EOQ model with time sensitive backlogging.
Appl. Math. Comput., 2014
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014
2013
Smart Comput. Rev., 2013
An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2013
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2013
A novel linear polynomial-based dynamic key management scheme for hierarchical access control.
Int. J. Trust. Manag. Comput. Commun., 2013
Fuzzy inventory models for items with imperfect quality and shortage backordering under crisp and fuzzy decision variables.
Comput. Ind. Eng., 2013
Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function.
Proceedings of the Security in Computing and Communications - International Symposium, 2013
LHSC: An effective dynamic key management scheme for linear hierarchical access control.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013
2012
Fuzzy EOQ models with ramp type demand rate, partial backlogging and time dependent deterioration rate.
Int. J. Math. Oper. Res., 2012
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
2010
Optimal retailer replenishment decisions in the EPQ model for deteriorating items with two level of trade credit financing.
Int. J. Math. Oper. Res., 2010
2009
Int. J. Syst. Sci., 2009
2006
An EOQ model with fuzzy inflation rate and fuzzy deterioration rate when a delay in payment is permissible.
Int. J. Syst. Sci., 2006