Arijit Karati

Orcid: 0000-0001-5605-7354

According to our database1, Arijit Karati authored at least 28 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Secure Cloud Gaming System.
J. Inf. Sci. Eng., May, 2023

Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Cryptanalysis of a Lightweight Privacy Enhancing Authentication Scheme for Internet of Vehicles.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing Environment.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
Quantum-Defended Blockchain-Assisted Data Authentication Protocol for Internet of Vehicles.
IEEE Trans. Veh. Technol., 2022

Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

Federated Secure Data Sharing by Edge-Cloud Computing Model.
Proceedings of the IEEE Global Communications Conference, 2022

SELECT: Secure and Lightweight Context-Aware Mechanism for Smart Vehicular Networks.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2021
Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment.
IEEE Trans. Cloud Comput., 2021

LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments.
IEEE Syst. J., 2021

Reliable file transfer protocol with producer anonymity for Named Data Networking.
J. Inf. Secur. Appl., 2021

Design of a secure file storage and access protocol for cloud-enabled Internet of Things environment.
Comput. Electr. Eng., 2021

2020
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

2019
Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices.
IEEE Internet Things J., 2019

Provably secure and authenticated data sharing protocol for IoT-based crowdsensing network.
Trans. Emerg. Telecommun. Technol., 2019

2018
Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments.
IEEE Trans. Ind. Informatics, 2018

A pairing-free and provably secure certificateless signature scheme.
Inf. Sci., 2018

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018

Enhancement of FTP-NDN Supporting Nondesignated Receivers.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

Cryptanalysis and improvement of a mutual user authentication scheme for the Internet of Things.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.
Secur. Commun. Networks, 2017

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
J. Medical Syst., 2017

2016
Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme.
Secur. Commun. Networks, 2016

Malicious node detection using ID-based authentication technique.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

Design of an enhanced authentication protocol and its verification using AVISPA.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

A practical identity based signcryption scheme from bilinear pairing.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2015
Secure Remote Login Scheme with Password and Smart Card Update Facilities.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015

Cryptanalysis of Zheng Et al.'s Pairing-Free Secure IBE Scheme.
Proceedings of the 2015 International Conference on Information Technology, 2015


  Loading...