Adrijit Goswami

According to our database1, Adrijit Goswami authored at least 49 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Optimization of vehicle speed for batches to minimize supply chain cost under uncertain demand.
Inf. Sci., 2020

2019
Mathematical model for diabetes in fuzzy environment with stability analysis.
J. Intell. Fuzzy Syst., 2019

Nonlinear Triangular Intuitionistic Fuzzy Number and Its Application in Linear Integral Equation.
Adv. Fuzzy Syst., 2019

2018
Vendor-buyer integrated production-inventory system for imperfect quality item under trade credit finance and variable setup cost.
RAIRO Oper. Res., 2018

A Study of an EOQ Model Under Cloudy Fuzzy Demand Rate.
Proceedings of the Mathematics and Computing - 4th International Conference, 2018

2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017

Designing multi-period supply chain network considering risk and emission: a multi-objective approach.
Ann. Oper. Res., 2017

2016
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.
IEEE Trans. Consumer Electron., 2016

An improved inventory model with random review period and temporary price discount for deteriorating items.
Int. J. Syst. Assur. Eng. Manag., 2016

A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2016

Two-echelon fuzzy stochastic supply chain for the manufacturer-buyer integrated production-inventory system.
J. Intell. Manuf., 2016

A secure and efficient time-bound hierarchical access control scheme for secure broadcasting.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Multi-objective modeling of production and pollution routing problem with time window: A self-learning particle swarm optimization approach.
Comput. Ind. Eng., 2016

An efficient fast algorithm for discovering closed+ high utility itemsets.
Appl. Intell., 2016

2015
A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems.
Wirel. Pers. Commun., 2015

DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks.
Wirel. Pers. Commun., 2015

A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards.
IEEE Trans. Inf. Forensics Secur., 2015

An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards.
Secur. Commun. Networks, 2015

A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks.
Secur. Commun. Networks, 2015

An effective association rule mining scheme using a new generic basis.
Knowl. Inf. Syst., 2015

A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.
J. Medical Syst., 2015

A robust anonymous biometric-based remote user authentication scheme using smart cards.
J. King Saud Univ. Comput. Inf. Sci., 2015

An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card.
J. Inf. Secur. Appl., 2015

EPQ model with learning consideration, imperfect production and partial backlogging in fuzzy random environment.
Int. J. Syst. Sci., 2015

An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices.
IACR Cryptol. ePrint Arch., 2015

An efficient approach for mining association rules from high utility itemsets.
Expert Syst. Appl., 2015

A continuous review production-inventory system in fuzzy random environment: Minmax distribution free procedure.
Comput. Ind. Eng., 2015

A fuzzy random EPQ model for imperfect quality items with possibility and necessity constraints.
Appl. Soft Comput., 2015

2014
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function.
J. Medical Syst., 2014

A secure effective key management scheme for dynamic access control in a large leaf class hierarchy.
Inf. Sci., 2014

An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function.
Int. J. Commun. Networks Distributed Syst., 2014

Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'.
IACR Cryptol. ePrint Arch., 2014

An Algorithm for Mining High Utility Closed Itemsets and Generators.
CoRR, 2014

An interpolating by pass to Pareto optimality in intuitionistic fuzzy technique for a EOQ model with time sensitive backlogging.
Appl. Math. Comput., 2014

Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications, 2014

2013
A New Key Management Scheme for a User Hierarchy based on a Hybrid Cryptosystem.
Smart Comput. Rev., 2013

An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Syst., 2013

A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2013

A novel linear polynomial-based dynamic key management scheme for hierarchical access control.
Int. J. Trust. Manag. Comput. Commun., 2013

Fuzzy inventory models for items with imperfect quality and shortage backordering under crisp and fuzzy decision variables.
Comput. Ind. Eng., 2013

Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

LHSC: An effective dynamic key management scheme for linear hierarchical access control.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
Fuzzy EOQ models with ramp type demand rate, partial backlogging and time dependent deterioration rate.
Int. J. Math. Oper. Res., 2012

A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2010
Optimal retailer replenishment decisions in the EPQ model for deteriorating items with two level of trade credit financing.
Int. J. Math. Oper. Res., 2010

2009
Probabilistic EOQ model for deteriorating items under trade credit financing.
Int. J. Syst. Sci., 2009

2006
An EOQ model with fuzzy inflation rate and fuzzy deterioration rate when a delay in payment is permissible.
Int. J. Syst. Sci., 2006


  Loading...