Daya Sagar Gupta

Orcid: 0000-0001-5401-7287

According to our database1, Daya Sagar Gupta authored at least 27 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Rumor identification and diffusion impact analysis in real-time text stream using deep learning.
J. Supercomput., April, 2024

PiLike: Post-Quantum Identity-Based Lightweight Authenticated Key Exchange Protocol for IIoT Environments.
IEEE Syst. J., March, 2024

IoT-ID3PAKA: Efficient and Robust ID-3PAKA Protocol for Resource-Constrained IoT Devices.
IEEE Internet Things J., March, 2024

PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments.
Comput. Networks, January, 2024

2023
Correction to: An Improved Certificateless Mutual Authentication and Key Agreement Protocol for Cloud-Assisted Wireless Body Area Networks.
Wirel. Pers. Commun., 2023

An Improved Certificateless Mutual Authentication and Key Agreement Protocol for Cloud-Assisted Wireless Body Area Networks.
Wirel. Pers. Commun., 2023

Secure data authentication and access control protocol for industrial healthcare system.
J. Ambient Intell. Humaniz. Comput., 2023

A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System.
Comput. Commun., 2023

Blockchain-based Secure Storage and Management of Electronic Health Record using a Smart Card.
Proceedings of the 5th International Conference on Recent Advances in Information Technology, 2023

2022
Quantum-Defended Blockchain-Assisted Data Authentication Protocol for Internet of Vehicles.
IEEE Trans. Veh. Technol., 2022

Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security.
Comput. Commun., 2022

Real-time event detection and classification in social text steam using embedding.
Clust. Comput., 2022

SP2P-MAKA: Smart Contract Based Secure P2P Mutual Authentication Key Agreement Protocol for Intelligent Energy System.
Proceedings of the Intelligent Systems Design and Applications - 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022, 2022

2021
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
IEEE Syst. J., 2021

LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments.
IEEE Syst. J., 2021

Efficient and Secure Design of ID-3PAKA Protocol Using ECC.
Proceedings of the International Conference on Computer, 2021

2020
A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2020

2019
An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice.
Computing, 2019

A Secure Identity-based Deniable Authentication Protocol for MANETs.
Proceedings of the 2019 International Conference on Computer, 2019

2018
A novel and efficient lattice-based authenticated key exchange protocol in C-K model.
Int. J. Commun. Syst., 2018

Design of lattice-based ElGamal encryption and signature schemes using SIS problem.
Trans. Emerg. Telecommun. Technol., 2018

Security weakness of a lattice-based key exchange protocol.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

Hierarchy-based cheating detection and cheater identification in secret sharing schemes.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

2017
On Securing Bi- and Tri-partite Session Key Agreement Protocol Using IBE Framework.
Wirel. Pers. Commun., 2017

A Secure Cloud Storage using ECC-Based Homomorphic Encryption.
Int. J. Inf. Secur. Priv., 2017

An ECC-based authenticated group key exchange protocol in IBE framework.
Int. J. Commun. Syst., 2017

2015
Secure Computation on Cloud Storage: A Homomorphic Approach.
J. Cases Inf. Technol., 2015


  Loading...