Debasis Giri

Orcid: 0000-0003-3033-3036

According to our database1, Debasis Giri authored at least 64 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Varied offspring memetic algorithm with three parents for a realistic synchronized goods delivery and service problem.
Soft Comput., March, 2024

Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey.
Secur. Priv., 2024

2023
Emergent multipath COVID-19 specimen collection problem with green corridor through variable length GA.
Expert Syst. Appl., December, 2023

Multipath traveling purchaser problem with time-dependent market structure using quantum-inspired variable length genetic algorithm.
Comput. Ind. Eng., December, 2023

Optimum Node Deployment Policy (ONDP) for WSN: Trade-off Between Maximization of Area Coverage and Lifetime.
Wirel. Pers. Commun., November, 2023

Style matching CAPTCHA: match neural transferred styles to thwart intelligent attacks.
Multim. Syst., August, 2023

A new robust and fragile scheme based on chaotic maps and dwt for medical image security.
Multim. Tools Appl., March, 2023

SMSDect: A Prediction Model for Smishing Attack Detection Using Machine Learning and Text Analysis.
Proceedings of the IEEE Global Communications Conference, 2023

Prediction of Depression using Emotion and Sentiment Analysis.
Proceedings of the OITS International Conference on Information Technology, 2023

2022
Chaotic neural networks and farfalle construction based parallel keyed secure hash function.
Secur. Priv., 2022

A secure image encryption scheme based on three different chaotic maps.
Multim. Tools Appl., 2022

Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022

A New Image Encryption Based on Two Chaotic Maps and Affine Transform.
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2022

Security Frameworks for Green Mobile Cloud Computing.
Proceedings of the Green Mobile Cloud Computing, 2022

2021
Real-Time Speech Emotion Analysis for Smart Home Assistants.
IEEE Trans. Consumer Electron., 2021

Novel Multiparameter Detection and Recovery Technique for Diverse Network Systems.
IEEE Syst. J., 2021

Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters.
J. Syst. Archit., 2021

Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map.
J. Inf. Secur. Appl., 2021

AI and Blockchain-Based Cloud-Assisted Secure Vaccine Distribution and Tracking in IoMT-Enabled COVID-19 Environment.
IEEE Internet Things Mag., 2021

Security in Critical Communication for Mobile Edge Computing Based IoE Applications.
Mobile Edge Computing, 2021

2020
A robust authentication and access control protocol for securing wireless healthcare sensor networks.
J. Inf. Secur. Appl., 2020

A Geometric-Based User Authentication Scheme for Multi-server Architecture: Cryptanalysis and Enhancement.
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020

Weighted Matrix-Based Random Data Hiding Scheme Within a Pair of Interpolated Image.
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020

2019
Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN.
IEEE Syst. J., 2019

M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes.
IEEE Syst. J., 2019

ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications.
IET Networks, 2019

SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol.
Cryptologia, 2019

Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019

On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019

FP-Captcha: An Improved Captcha Design Scheme Based on Face Points.
Proceedings of the Recent Advances in Intelligent Information Systems and Applied Mathematics, 2019

4-Dimensional Transportation Problem for Substitute and Complementary Items Under Rough Environment.
Proceedings of the Recent Advances in Intelligent Information Systems and Applied Mathematics, 2019

2018
Linear-feedback shift register-based multi-ant cellular automation and chaotic map-based image encryption.
Secur. Priv., 2018

Dual image based reversible data hiding scheme using (7, 4) hamming code.
Multim. Tools Appl., 2018

ES3B: Enhanced Security System for Smart Building Using IoT.
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018

A Novel Steganographic Scheme Using Weighted Matrix in Transform Domain.
Proceedings of the Mathematics and Computing - 4th International Conference, 2018

2017
Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card.
Wirel. Pers. Commun., 2017

A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electron., 2017

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments.
Secur. Commun. Networks, 2017

Partial reversible data hiding scheme using (7, 4) hamming code.
Multim. Tools Appl., 2017

A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Commun. Syst., 2017

Cluster-Based Energy-Efficient Secure Routing in Wireless Sensor Networks.
Proceedings of the Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30, 2017

An Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite Geometry.
Proceedings of the Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30, 2017

SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB Mass Storage Devices.
IEEE Trans. Consumer Electron., 2016

Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Secur. Commun. Networks, 2016

An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Secur. Commun. Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Secur. Commun. Networks, 2016

An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card.
Int. J. Netw. Secur., 2016

Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion.
Int. J. Netw. Secur., 2016

2015
Efficient biometric and password based mutual authentication for consumer USB mass storage devices.
IEEE Trans. Consumer Electron., 2015

An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems.
J. Medical Syst., 2015

SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs.
Int. J. Inf. Commun. Technol., 2015

An Efficient Data Hiding Scheme using Hamming Error Correcting Code.
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015

2014
An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment.
J. Medical Syst., 2014

2013
Probabilistic Approach-Based Congestion-Aware Swarm-Inspired Load-Balancing Multipath Data Routing in MANETs.
Proceedings of the Intelligent Computing, 2013

2011
An Identity Based Key Management Scheme in Wireless Sensor Networks
CoRR, 2011

2010
A Cryptosystem for Encryption and Decryption of Long Confidential Messages.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

2008
A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security.
Int. J. Netw. Secur., 2008

Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2007
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies.
Int. J. Netw. Secur., 2007

Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes.
Proceedings of the Information Systems Security, Third International Conference, 2007

Cryptanalysis and Improvement of Das et al.'s Proxy Signature Scheme.
Proceedings of the 10th International Conference on Information Technology, 2007

2006
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2006

2003
An approach to confidence based page ranking for user oriented Web search.
SIGMOD Rec., 2003


  Loading...