Amar Kumar Mohapatra

Orcid: 0000-0002-8025-6879

According to our database1, Amar Kumar Mohapatra authored at least 15 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
BPADTA: Blockchain-based privacy-preserving authentication scheme for digital twin empowered aerospace industry.
Comput. Electr. Eng., October, 2023

PSECAS: A physical unclonable function based secure authentication scheme for Internet of Drones.
Comput. Electr. Eng., May, 2023

VSMAS2HN: Verifiably Secure Mutual Authentication Scheme for Smart Healthcare Network.
Proceedings of the Advances in Computing and Data Sciences - 7th International Conference, 2023

2021
A survey on security and authentication in wireless body area networks.
J. Syst. Archit., 2021

RC-DBSCAN: redundancy controlled DBSCAN algorithm for densely deployed wireless sensor network to prolong the network lifespan.
Int. J. Comput. Appl. Technol., 2021

2020
SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks.
Wirel. Pers. Commun., 2020

A survey and classification of XML based attacks on web applications.
Inf. Secur. J. A Glob. Perspect., 2020

DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications.
Int. J. Inf. Secur. Priv., 2020

An energy efficient and load balanced sink mobility for wireless sensor networks.
Int. J. Inf. Commun. Technol., 2020

2019
Energy Efficient Model for Recovery from Multiple Nodes Failure in Wireless Sensor Networks.
Wirel. Pers. Commun., 2019

Analysis of software vulnerability classification based on different technical parameters.
Inf. Secur. J. A Glob. Perspect., 2019

2013
An Improved Framework for Incident Handling.
Inf. Secur. J. A Glob. Perspect., 2013

A Bio-Chaotic Block Cryptosystem for Privacy Protection of Multimedia Data.
Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013, 2013

Digital Image Authentication Model Based on Edge Adaptive Steganography.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

2008
Secured biometric template.
Proceedings of the 16th International Conference on Networks, 2008


  Loading...