G. P. Biswas

According to our database1, G. P. Biswas authored at least 66 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Location estimation based routing for mobile adhoc network.
Journal of Intelligent and Fuzzy Systems, 2018

A pairing-free and provably secure certificateless signature scheme.
Inf. Sci., 2018

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet of Things Journal, 2018

A novel and efficient lattice-based authenticated key exchange protocol in C-K model.
Int. J. Communication Systems, 2018

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment.
Future Generation Comp. Syst., 2018

A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Generation Comp. Syst., 2018

Design of lattice-based ElGamal encryption and signature schemes using SIS problem.
Trans. Emerging Telecommunications Technologies, 2018

A robust mutual authentication protocol for WSN with multiple base-stations.
Ad Hoc Networks, 2018

2017
Enhancement of DSR and AODV Protocols Using Link Availability Prediction.
Wireless Personal Communications, 2017

On Securing Bi- and Tri-partite Session Key Agreement Protocol Using IBE Framework.
Wireless Personal Communications, 2017

Design of authentication protocol for wireless sensor network-based smart vehicular system.
Vehicular Communications, 2017

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
J. Medical Systems, 2017

A Secure Cloud Storage using ECC-Based Homomorphic Encryption.
IJISP, 2017

An ECC-based authenticated group key exchange protocol in IBE framework.
Int. J. Communication Systems, 2017

An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Communication Systems, 2017

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017

Modification of Traditional RSA into Symmetric-RSA Cryptosystems.
IJBDCN, 2017

2016
Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography.
Wireless Personal Communications, 2016

Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme.
Security and Communication Networks, 2016

A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Security and Communication Networks, 2016

Routing and CDMA-MAC based cross-layering for wireless ad hoc networks.
IJAHUC, 2016

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Computer Networks, 2016

Analysis and enhancement of pair-wise code assignment scheme used in Code Division Multiple Access protocol.
Computers & Electrical Engineering, 2016

A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks.
Ad Hoc Networks, 2016

A practical identity based signcryption scheme from bilinear pairing.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Confidentiality and Storage of Data in Cloud Environment.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

Design of Visual Cryptography Scheme Using C(m, w) Combinations.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

2015
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
Wireless Personal Communications, 2015

Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment.
Wireless Personal Communications, 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Systems, 2015

Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Systems, 2015

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Systems, 2015

An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.
J. Medical Systems, 2015

A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
J. Medical Systems, 2015

A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS.
J. Medical Systems, 2015

Secure Computation on Cloud Storage: A Homomorphic Approach.
J. Cases on Inf. Techn., 2015

Cryptanalysis of a Markov Chain Based User Authentication Scheme.
IACR Cryptology ePrint Archive, 2015

Secure Remote Login Scheme with Password and Smart Card Update Facilities.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015

An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015

Cryptanalysis of Zheng Et al.'s Pairing-Free Secure IBE Scheme.
Proceedings of the 2015 International Conference on Information Technology, 2015

2014
Design of an efficient mobile health system for achieving HIPAA privacy-security regulations.
IJWMC, 2014

Design of Hybrid MAC Protocol for Wireless Sensor Network.
Proceedings of the Recent Advances in Information Technology, 2014

Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC.
Proceedings of the Recent Advances in Information Technology, 2014

Dynamic Clustering Based Hybrid Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Recent Advances in Information Technology, 2014

Modification of AODV for enhanced data delivery.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

TCA-PCA based hybrid code assignment for enhancement and easy deployability of CDMA protocol.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Design of improved password authentication and update scheme based on elliptic curve cryptography.
Mathematical and Computer Modelling, 2013

Design of network topology based on delay-cost sink tree.
IJCNDS, 2013

Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2013

2012
Design of multi-path data routing algorithm based on network reliability.
Computers & Electrical Engineering, 2012

A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks.
Annales des Télécommunications, 2012

Design and implementation of an enhanced rate adaptation scheme for wireless LAN Ieee-802.11.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Design of an efficient ID-based short designated verifier proxy signature scheme.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Node-blockage reduction and removal of hidden-terminal problem of CSMA/CA MAC protocol.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Optimization of multiple objectives and topological design of data networks using genetic algorithm.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

Certificateless strong designated verifier multisignature scheme using bilinear pairings.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

An ECC based public key infrastructure usable for mobile applications.
Proceedings of the Second International Conference on Computational Science, 2012

2011
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
Journal of Systems and Software, 2011

Establishment of Authenticated Secret Session Keys Using Digital Signature Standard.
Information Security Journal: A Global Perspective, 2011

Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS.
IJHCR, 2011

Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling of Codebook and Index Matrix
CoRR, 2011

Design of Mobile-PKI for using mobile phones in various applications.
Proceedings of the International Conference on Recent Trends in Information Systems, 2011

Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment.
Proceedings of the Advances in Computing and Communications, 2011

2010
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Approximation of the Node-Pair Reliability of Data Communication Networks.
Proceedings of the International Conference on Data Storage and Data Engineering, 2010

2008
Modification of Channel Based IP Multicasting to Support Many to Many Communications.
Proceedings of the 2008 International Conference on Internet Computing, 2008


  Loading...