G. P. Biswas

Affiliations:
  • Indian School of Mines, Dhanbad, India
  • Indian Institute of Technology, Kharagpur, India


According to our database1, G. P. Biswas authored at least 96 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet.
Wirel. Pers. Commun., September, 2023

2021
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography.
J. Supercomput., 2021

An e-healthcare authentication protocol employing cloud computing.
Int. J. Ad Hoc Ubiquitous Comput., 2021

Design of a secure file storage and access protocol for cloud-enabled Internet of Things environment.
Comput. Electr. Eng., 2021

A Genetic Algorithm-Based Metaheuristic Approach for Test Cost Optimization of 3D SIC.
IEEE Access, 2021

2020
Co-Optimization of Test Wrapper Length and TSV for TSV Based 3D SOCs.
J. Electron. Test., 2020

Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure.
Comput. Commun., 2020

Heuristic Approach for Identification of Random TSV Defects in 3D IC During Pre-bond Testing.
Proceedings of the 29th IEEE Asian Test Symposium, 2020

2019
Design of routing protocol for multi-sink based wireless sensor networks.
Wirel. Networks, 2019

Efficient and secure business model for content centric network using elliptic curve cryptography.
Int. J. Commun. Syst., 2019

Provably secure and authenticated data sharing protocol for IoT-based crowdsensing network.
Trans. Emerg. Telecommun. Technol., 2019

An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice.
Computing, 2019

2018
Location estimation based routing for mobile adhoc network.
J. Intell. Fuzzy Syst., 2018

A pairing-free and provably secure certificateless signature scheme.
Inf. Sci., 2018

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018

A novel and efficient lattice-based authenticated key exchange protocol in C-K model.
Int. J. Commun. Syst., 2018

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment.
Future Gener. Comput. Syst., 2018

A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018

Design of lattice-based ElGamal encryption and signature schemes using SIS problem.
Trans. Emerg. Telecommun. Technol., 2018

A robust mutual authentication protocol for WSN with multiple base-stations.
Ad Hoc Networks, 2018

Security weakness of a lattice-based key exchange protocol.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

Hierarchy-based cheating detection and cheater identification in secret sharing schemes.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

2017
Enhancement of DSR and AODV Protocols Using Link Availability Prediction.
Wirel. Pers. Commun., 2017

On Securing Bi- and Tri-partite Session Key Agreement Protocol Using IBE Framework.
Wirel. Pers. Commun., 2017

Design of authentication protocol for wireless sensor network-based smart vehicular system.
Veh. Commun., 2017

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
J. Medical Syst., 2017

A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication.
J. King Saud Univ. Comput. Inf. Sci., 2017

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017

A Secure Cloud Storage using ECC-Based Homomorphic Encryption.
Int. J. Inf. Secur. Priv., 2017

An ECC-based authenticated group key exchange protocol in IBE framework.
Int. J. Commun. Syst., 2017

An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Commun. Syst., 2017

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017

Modification of Traditional RSA into Symmetric-RSA Cryptosystems.
Int. J. Bus. Data Commun. Netw., 2017

Design of Secure and Efficient Electronic Payment System for Mobile Users.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

2016
Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2016

Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme.
Secur. Commun. Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Secur. Commun. Networks, 2016

Routing and CDMA-MAC based cross-layering for wireless ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Comput. Networks, 2016

Analysis and enhancement of pair-wise code assignment scheme used in Code Division Multiple Access protocol.
Comput. Electr. Eng., 2016

A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks.
Ad Hoc Networks, 2016

An improved secure remote login protocol with three-factor authentication.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

Location and selective-bordercast based enhancement of zone routing protocol.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

Malicious node detection using ID-based authentication technique.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

Design of an enhanced authentication protocol and its verification using AVISPA.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

Modification of Symmetric-Key DES into Efficient Asymmetric-Key DES using RSA.
ICTCS, 2016

A practical identity based signcryption scheme from bilinear pairing.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Confidentiality and Storage of Data in Cloud Environment.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

Design of Visual Cryptography Scheme Using C(m, w) Combinations.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

2015
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
Wirel. Pers. Commun., 2015

Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment.
Wirel. Pers. Commun., 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Syst., 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2015

An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.
J. Medical Syst., 2015

A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
J. Medical Syst., 2015

A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS.
J. Medical Syst., 2015

Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2015

Secure Computation on Cloud Storage: A Homomorphic Approach.
J. Cases Inf. Technol., 2015

Cryptanalysis of a Markov Chain Based User Authentication Scheme.
IACR Cryptol. ePrint Arch., 2015

Secure Remote Login Scheme with Password and Smart Card Update Facilities.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015

An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Cryptanalysis of Zheng Et al.'s Pairing-Free Secure IBE Scheme.
Proceedings of the 2015 International Conference on Information Technology, 2015

2014
A Certificate Authority (CA)-based cryptographic solution for HIPAA privacy/security regulations.
J. King Saud Univ. Comput. Inf. Sci., 2014

Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2014

A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2014

Design of an efficient mobile health system for achieving HIPAA privacy-security regulations.
Int. J. Wirel. Mob. Comput., 2014

Design of Hybrid MAC Protocol for Wireless Sensor Network.
Proceedings of the Recent Advances in Information Technology, 2014

Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC.
Proceedings of the Recent Advances in Information Technology, 2014

Dynamic Clustering Based Hybrid Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Recent Advances in Information Technology, 2014

Modification of AODV for enhanced data delivery.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

TCA-PCA based hybrid code assignment for enhancement and easy deployability of CDMA protocol.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Design of improved password authentication and update scheme based on elliptic curve cryptography.
Math. Comput. Model., 2013

Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2013

Design of network topology based on delay-cost sink tree.
Int. J. Commun. Networks Distributed Syst., 2013

Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2013

2012
Design of multi-path data routing algorithm based on network reliability.
Comput. Electr. Eng., 2012

A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks.
Ann. des Télécommunications, 2012

Design and implementation of an enhanced rate adaptation scheme for wireless LAN Ieee-802.11.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Design of an efficient ID-based short designated verifier proxy signature scheme.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Node-blockage reduction and removal of hidden-terminal problem of CSMA/CA MAC protocol.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Optimization of multiple objectives and topological design of data networks using genetic algorithm.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Certificateless strong designated verifier multisignature scheme using bilinear pairings.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

An ECC based public key infrastructure usable for mobile applications.
Proceedings of the Second International Conference on Computational Science, 2012

2011
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
J. Syst. Softw., 2011

Establishment of Authenticated Secret Session Keys Using Digital Signature Standard.
Inf. Secur. J. A Glob. Perspect., 2011

Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS.
Int. J. Handheld Comput. Res., 2011

Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling of Codebook and Index Matrix
CoRR, 2011

Design of Mobile-PKI for using mobile phones in various applications.
Proceedings of the International Conference on Recent Trends in Information Systems, 2011

Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment.
Proceedings of the Advances in Computing and Communications, 2011

2010
Approximation of the Node-Pair Reliability of Data Communication Networks.
Proceedings of the International Conference on Data Storage and Data Engineering, 2010

2008
Modification of Channel Based IP Multicasting to Support Many to Many Communications.
Proceedings of the 2008 International Conference on Internet Computing, 2008

2000
Theory and Application of GF(2p) Cellular Automata as On-chip Test Pattern Generator.
Proceedings of the 13th International Conference on VLSI Design (VLSI Design 2000), 2000

1997
A Design Technique of TSC Checker for Borden's Code.
Proceedings of the 10th International Conference on VLSI Design (VLSI Design 1997), 1997

Design of t-UED/AUED Codes from Berger's AUED Code.
Proceedings of the 10th International Conference on VLSI Design (VLSI Design 1997), 1997

1995
Generalized modular design of testable m-out-of-n code checker.
Proceedings of the 4th Asian Test Symposium (ATS '95), 1995


  Loading...