Angsuman Das

Orcid: 0000-0001-7647-4454

According to our database1, Angsuman Das authored at least 18 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A generalization of Pappus graph.
Electron. J. Graph Theory Appl., 2022

Determining Number of Kneser Graphs: Exact Values and Improved Bounds.
Discret. Math. Theor. Comput. Sci., 2022

On neighborhood graphs: Domination, coloring and other properties.
Discret. Math. Algorithms Appl., 2022

2021
On twin preserving spanning subgraph.
J. Intell. Fuzzy Syst., 2021

Connected domination value in graphs.
Electron. J. Graph Theory Appl., 2021

Triameter of graphs.
Discuss. Math. Graph Theory, 2021

2020
Determining Number of Generalized and Double Generalized Petersen Graph.
Proceedings of the Algorithms and Discrete Applied Mathematics, 2020

2018
On α-Domination in Graphs.
Graphs Comb., 2018

2017
Infinite graphs with finite dominating sets.
Discret. Math. Algorithms Appl., 2017

Coefficient of domination in graph.
Discret. Math. Algorithms Appl., 2017

Connected Fair Domination in Graphs.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

2015
Plaintext checkable encryption with designated checker.
Adv. Math. Commun., 2015

Plaintext Checkable Signcryption.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure.
Proceedings of the Distributed Computing and Internet Technology, 2015

2013
Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture.
Proceedings of the Provable Security - 7th International Conference, 2013

Signcryption from Randomness Recoverable PKE Revisited.
Proceedings of the Information Systems Security - 9th International Conference, 2013

2012
An efficient IND-CCA2 secure Paillier-based cryptosystem.
Inf. Process. Lett., 2012

2010
An efficient multi-use multi-secret sharing scheme based on hash function.
Appl. Math. Lett., 2010


  Loading...