Jayaprakash Kar

Orcid: 0000-0003-4800-4791

According to our database1, Jayaprakash Kar authored at least 35 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Pairing-Free Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Access, 2023

PSDP: Blockchain-Based Computationally Efficient Provably Secure Data Possession.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
EPPDP: An Efficient Privacy-Preserving Data Possession With Provable Security in Cloud Storage.
IEEE Syst. J., 2022

ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications.
J. Syst. Archit., 2022

2021
ELDA: an efficient and low-cost protocol for data authentication for IoT.
Wirel. Networks, 2021

A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks.
IEEE Syst. J., 2021

A Research Survey on Applications of Consensus Protocols in Blockchain.
Secur. Commun. Networks, 2021

PUA-KE: Practical User Authentication with Key Establishment and its Application in Implantable Medical Devices.
J. Syst. Archit., 2021

CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks.
J. Inf. Secur. Appl., 2021

2020
Provably secure certificateless deniable authenticated encryption scheme.
J. Inf. Secur. Appl., 2020

Bitcoin Technology and Its Security Challenges: A Research Survey.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

2019
An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security.
IEEE Access, 2019

2017
Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Mitigating Threats and Security Metrics in Cloud Computing.
J. Inf. Process. Syst., 2016

Generic Construction of Certificateless Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2016

Certi cateless Aggregate Short Signature Scheme.
IACR Cryptol. ePrint Arch., 2016

2015
Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles.
Int. J. Netw. Secur., 2015

Short Online/Off-line Signature Scheme for Wireless Sensor Networks.
Int. J. Inf. Secur. Priv., 2015

Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme.
IACR Cryptol. ePrint Arch., 2015

On construction of signcryption scheme for smart card security.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

2014
Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network.
Int. J. Netw. Secur., 2014

One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2014

Online/Off-line Ring Signature Scheme with Provable Security.
IACR Cryptol. ePrint Arch., 2014

2013
ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve.
Int. J. Netw. Secur., 2013

Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2013

2012
An Efficient Signcryption Scheme from q-Diffie-Hellman Problems.
IACR Cryptol. ePrint Arch., 2012

Provably Secure Identity-Based Aggregate Signature Scheme.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
Proxy Blind Multi-signature Scheme using ECC for handheld devices.
IACR Cryptol. ePrint Arch., 2011

Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme.
Proceedings of the Information Security and Assurance - International Conference, 2011

ID-Based Deniable Authentication Protocol Suitable for Mobile Devices.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique.
Proceedings of the 2011 International Conference on Communication, 2011

2010
A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm.
IACR Cryptol. ePrint Arch., 2010

2009
An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP.
IACR Cryptol. ePrint Arch., 2009

An Efficient Password Security of Key Exchange Protocol based on ECDLP.
IACR Cryptol. ePrint Arch., 2009


  Loading...