Debasish Jena

Orcid: 0000-0002-1360-7544

According to our database1, Debasish Jena authored at least 46 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme.
Int. J. Grid Util. Comput., 2023

Leveraging Teacher Ensembles to Mitigate Label Noise in Clustering-Based Unsupervised Domain Adaptation for Person Re-Identification.
Proceedings of the OITS International Conference on Information Technology, 2023

2022
Machine learning based accident prediction in secure IoT enable transportation system.
J. Intell. Fuzzy Syst., 2022

Blockchain-based consensus algorithm for solving security issues in distributed internet of things.
Int. J. Electron. Bus., 2022

A state-of-the-art security and attacks analysis in blockchain applications network.
Int. J. Commun. Networks Distributed Syst., 2022

2021
Authentication and Key Management in Distributed IoT Using Blockchain Technology.
IEEE Internet Things J., 2021

Addressing Security and Privacy Issues of IoT Using Blockchain Technology.
IEEE Internet Things J., 2021

An ECC-based authentication protocol for fog-IoT enabled smart home environment.
Int. J. Intell. Syst. Technol. Appl., 2021

A Blockchain-Based Distributed Authentication System for Healthcare.
Int. J. Heal. Inf. Syst. Informatics, 2021

A blockchain-based ITS framework with privacy preserving for secure and reliable communication.
Int. J. Commun. Networks Distributed Syst., 2021

Privacy preserving file auditing schemes for cloud storage using verifiable random function.
Int. J. Commun. Networks Distributed Syst., 2021

Secure Digitization of Land Record using Blockchain Technology in India.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

2020
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology.
Internet Things, 2020

Multi-party computation review for secure data processing in IoT-fog computing environment.
Int. J. Secur. Networks, 2020

Secure Key Storage and Access Delegation Through Cloud Storage.
Int. J. Knowl. Syst. Sci., 2020

Container-based task scheduling for edge computing in IoT-cloud environment using improved HBF optimisation algorithm.
Int. J. Embed. Syst., 2020

Integrating Machine Learning with Blockchain to Ensure Data Privacy.
Proceedings of the 11th International Conference on Computing, 2020

Distributed Ledger Technology for Securing IoT.
Proceedings of the 11th International Conference on Computing, 2020

Trust Management in Cyber Physical System using Blockchain.
Proceedings of the 11th International Conference on Computing, 2020

GreenVANET: Greening Vehicular Ad-hoc Network by Scheduling Up-link Channel.
Proceedings of the 11th International Conference on Computing, 2020

2019
Blockchain technology: A survey on applications and security privacy Challenges.
Internet Things, 2019

Study of Blockchain Based Decentralized Consensus Algorithms.
Proceedings of the TENCON 2019, 2019

DecAuth: Decentralized Authentication Scheme for IoT Device Using Ethereum Blockchain.
Proceedings of the TENCON 2019, 2019

MagTrack: Detecting Road Surface Condition using Smartphone Sensors and Machine Learning.
Proceedings of the TENCON 2019, 2019

A Novel Smart Meter Authentication Scheme for Secure Smart Grid Communication.
Proceedings of the TENCON 2019, 2019

A Secure Framework for Communication in Internet of Things Application using Hyperledger based Blockchain.
Proceedings of the 10th International Conference on Computing, 2019

A Blockchain Based Decentralized Authentication Framework for Resource Constrained IOT devices.
Proceedings of the 10th International Conference on Computing, 2019

Trustworthy Management in Decentralized IoT Application using Blockchain.
Proceedings of the 10th International Conference on Computing, 2019

A Novel User Authentication and Key Management Protocol for Cloud Assisted Body Area Network.
Proceedings of the 10th International Conference on Computing, 2019

A Framework to Build User Profile on Cryptocurrency Data for Detection of Money Laundering Activities.
Proceedings of the 2019 International Conference on Information Technology (ICIT), 2019

A Novel Approach to Solve Security and Privacy Issues for IoT Applications Using Blockchain.
Proceedings of the 2019 International Conference on Information Technology (ICIT), 2019

Security of Cloud Storage: A Survey.
Proceedings of the 2019 International Conference on Information Technology (ICIT), 2019

2018
Magneto: Leveraging Magnetic Field Changes for Inferring Smartphone App Usage.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

An ECC based Lightweight Authentication Protocol For Mobile Phone in Smart Home.
Proceedings of the 13th IEEE International Conference on Industrial and Information Systems, 2018

An Overview of Smart Contract and Use Cases in Blockchain Technology.
Proceedings of the 9th International Conference on Computing, 2018

2016
Color Image Visual Cryptography Scheme with Enhanced Security.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

2013
A novel authenticated encryption scheme with convertibility.
Math. Comput. Model., 2013

2011
A novel and efficient cryptosystem for large message encryption.
Int. J. Inf. Commun. Technol., 2011

Security in vehicular adhoc networks: a survey.
Proceedings of the 2011 International Conference on Communication, 2011

Honeypot in network security: a survey.
Proceedings of the 2011 International Conference on Communication, 2011

A novel simple secure internet voting protocol.
Proceedings of the 2011 International Conference on Communication, 2011

2010
A Secure e-Shopping Using Voice Ordering.
Proceedings of the Information Processing and Management, 2010

2009
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature.
Proceedings of the Contemporary Computing - Second International Conference, 2009

2008
A Novel Protocol for Smart Card Using ECDLP.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

Improved offline signature verification scheme using feature point extraction method.
Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, 2008

2007
A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash.
Proceedings of the 10th International Conference on Information Technology, 2007


  Loading...