Debapriyay Mukhopadhyay

Orcid: 0000-0003-0244-0010

According to our database1, Debapriyay Mukhopadhyay authored at least 15 papers between 2005 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Improvement over Montgomery Modular Multiplication.
Proceedings of the Information Systems Security - 17th International Conference, 2021

2015
YAHMD - Yet another heap memory debugger.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks.
Proceedings of the Information Systems Security - 11th International Conference, 2015

2014
Efficient multiple-precision integer division algorithm.
Inf. Process. Lett., 2014

2009
Improved algorithm for the widest empty 1-corner corridor.
Inf. Process. Lett., 2009

Improved Algorithm for a Widest 1-Corner Corridor.
Proceedings of the WALCOM: Algorithms and Computation, Third International Workshop, 2009

Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Security against Sybil Attack in Wireless Sensor Network through Location Verification.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009

2007
A Distributed Algorithm of Fault Recovery for Stateful Failover.
Proceedings of the Theory and Applications of Models of Computation, 2007

Model Checking in Practice: Analysis of Generic Bootloader Using SPIN.
Proceedings of the Formal Methods and Software Engineering, 2007

2006
Designing Reliable Architecture for Stateful Fault Tolerance.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Symmetric key based authenticated querying in wireless sensor networks.
Proceedings of the First International Conference in Integrated Internet Ad Hoc and Sensor Networks, 2006

Location Verification Based Defense Against Sybil Attack in Sensor Networks.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

A Sensor network design from a probabilistic automaton model of impersonation attack.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network.
Proceedings of the Distributed Computing and Internet Technology, 2005


  Loading...