Prosanta Gope

Orcid: 0000-0003-2786-0273

According to our database1, Prosanta Gope authored at least 104 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience.
IACR Cryptol. ePrint Arch., 2024

Quantum-Secure Certificate-Less Conditional Privacy-Preserving Authentication for VANET.
CoRR, 2024

PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices.
CoRR, 2024

Privacy-Preserving Collaborative Split Learning Framework for Smart Grid Load Forecasting.
CoRR, 2024

Attacking Delay-based PUFs with Minimal Adversary Model.
CoRR, 2024

2023
Sustainable and Round-Optimized Group Authenticated Key Exchange in Vehicle Communication.
IEEE Trans. Intell. Transp. Syst., December, 2023

Incremental hybrid intrusion detection for 6LoWPAN.
Comput. Secur., December, 2023

A Privacy-Preserving Authenticated Key Exchange Protocol for V2G Communications Using SSI.
IEEE Trans. Veh. Technol., November, 2023

Smart aging monitoring and early dementia recognition (SAMEDR): uncovering the hidden wellness parameter for preventive well-being monitoring to categorize cognitive impairment and dementia in community-dwelling elderly subjects through AI.
Neural Comput. Appl., November, 2023

BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications.
ACM Trans. Internet Techn., August, 2023

An enhanced secure delegation-based anonymous authentication protocol for PCSs.
Int. J. Commun. Syst., August, 2023

Data Privacy Enhancing in the IoT User/Device Behavior Analytics.
ACM Trans. Sens. Networks, May, 2023

RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., April, 2023

Privacy-Preserving User-Centric Authentication Protocol for IoT-Enabled Vehicular Charging System Using Decentralized Identity.
IEEE Internet Things Mag., March, 2023

QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code.
IEEE Trans. Netw. Sci. Eng., 2023

Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges.
IEEE Trans. Ind. Informatics, 2023

Consensus Adversarial Defense Method Based on Augmented Examples.
IEEE Trans. Ind. Informatics, 2023

PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Group-Based Authentication With DRAM-PUFs Using Machine Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Aware Secure Region-Based Handover for Small Cell Networks in 5G-Enabled Mobile Communication.
IEEE Trans. Inf. Forensics Secur., 2023

CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2023

AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks.
CoRR, 2023

An Effective LSTM-DDPM Scheme for Energy Theft Detection and Forecasting in Smart Grid.
CoRR, 2023

A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids.
CoRR, 2023

Design Rationale for Symbiotically Secure Key Management Systems in IoT and Beyond.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

A Generic Obfuscation Framework for Preventing ML-Attacks on Strong-PUFs through Exploitation of DRAM-PUFs.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential.
ACM Trans. Manag. Inf. Syst., December, 2022

An Ultra-Lightweight Data-Aggregation Scheme with Deep Learning Security for Smart Grid.
IEEE Wirel. Commun., 2022

PF-DA: Pairing Free and Secure Data Aggregation for Energy Internet-Based Smart Meter-to-Grid Communication.
IEEE Trans. Smart Grid, 2022

A Secure and Anonymous Communicate Scheme over the Internet of Things.
ACM Trans. Sens. Networks, 2022

Edge-Based Collaborative Training System for Artificial Intelligence-of-Things.
IEEE Trans. Ind. Informatics, 2022

A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things.
IEEE Trans. Ind. Informatics, 2022

SHARIF: Solid Pod-Based Secured Healthcare Information Storage and Exchange Solution in Internet of Things.
IEEE Trans. Ind. Informatics, 2022

Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN.
IEEE Trans. Inf. Forensics Secur., 2022

Data anonymization evaluation for big data and IoT environment.
Inf. Sci., 2022

ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers.
Entropy, 2022

Online Dynamic Reliability Evaluation of Wind Turbines based on Drone-assisted Monitoring.
CoRR, 2022

E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System.
CoRR, 2022

PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning.
CoRR, 2022

Decentralized Identifier-based Privacy-preserving Authenticated Key Exchange Protocol for Electric Vehicle Charging in Smart Grid.
CoRR, 2022

Adaptive Hybrid Heterogeneous IDS for 6LoWPAN.
CoRR, 2022

A Reconfigurable and Secure Firmware Updating Framework for Advanced Metering Infrastructure.
Proceedings of the IEEE International Conference on Communications, 2022

Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

ATVSA: Vehicle Driver Profiling for Situational Awareness.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
A Privacy-Aware Reconfigurable Authenticated Key Exchange Scheme for Secure Communication in Smart Grids.
IEEE Trans. Smart Grid, 2021

A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process.
IEEE J. Biomed. Health Informatics, 2021

An Efficient Blockchain-Based Authentication Scheme for Energy-Trading in V2G Networks.
IEEE Trans. Ind. Informatics, 2021

PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment.
IEEE Trans. Dependable Secur. Comput., 2021

A blockchain based secure communication framework for community interaction.
J. Inf. Secur. Appl., 2021

SCBS: A Short Certificate-Based Signature Scheme With Efficient Aggregation for Industrial-Internet-of-Things Environment.
IEEE Internet Things J., 2021

The Language's Impact on the Enigma Machine.
IACR Cryptol. ePrint Arch., 2021

A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation.
Computer, 2021

A provably secure authentication scheme for RFID-enabled UAV applications.
Comput. Commun., 2021

Design, analysis and implementation of a smart next generation secure shipping infrastructure using autonomous robot.
Comput. Networks, 2021

Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap.
IEEE Access, 2021

Reinforcement-Learning-based IDS for 6LoWPAN.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Electricity Theft Detection in the Presence of Prosumers Using a Cluster-based Multi-feature Detection Model.
Proceedings of the IEEE International Conference on Communications, 2021

2020
An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones.
IEEE Trans. Veh. Technol., 2020

An Efficient Privacy-Friendly Hop-by-Hop Data Aggregation Scheme for Smart Grids.
IEEE Syst. J., 2020

Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems.
Future Gener. Comput. Syst., 2020

Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme.
Future Gener. Comput. Syst., 2020

PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs.
Computer, 2020

PMAKE: Privacy-aware multi-factor authenticated key establishment scheme for Advance Metering Infrastructure in smart grid.
Comput. Commun., 2020

2019
An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication.
IEEE Trans. Smart Grid, 2019

Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication.
IEEE Trans. Smart Grid, 2019

Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System.
IEEE J. Biomed. Health Informatics, 2019

Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2019

Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2019

Smart Aging System: Uncovering the Hidden Wellness Parameter for Well-Being Monitoring and Anomaly Detection.
Sensors, 2019

Anonymous mutual authentication with location privacy support for secure communication in M2M home network services.
J. Ambient Intell. Humaniz. Comput., 2019

Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices.
IEEE Internet Things J., 2019

LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm.
Comput. Secur., 2019

Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions.
IEEE Consumer Electron. Mag., 2019

An Efficient Privacy-Friendly Multi-Hop Data Aggregation Scheme for Smart Grids.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019

2018
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions.
IEEE Trans. Inf. Forensics Secur., 2018

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multim. Tools Appl., 2018

An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids.
IEEE Internet Things J., 2018

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Commun. Syst., 2018

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment.
Future Gener. Comput. Syst., 2018

A Lightweight and Privacy-Preserving Data Aggregation for Dynamic Pricing-based Billing in Smart Grids.
Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2018

An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart Grids.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing.
Quantum Inf. Process., 2017

Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks.
J. Inf. Secur. Appl., 2017

Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services.
IEEE Internet Things J., 2017

2016
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2016

Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks.
IEEE Syst. J., 2016

PFX: an essence of authencryption for block-cipher security.
Secur. Commun. Networks, 2016

Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network.
Secur. Commun. Networks, 2016

An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks.
J. Netw. Comput. Appl., 2016

A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
J. Medical Syst., 2016

PFC-CTR, PFC-OCB: Efficient stream cipher modes of authencryption.
Cryptologia, 2016

RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode.
Cryptologia, 2016

Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Erratum to: Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks.
Wirel. Pers. Commun., 2015

Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks.
Wirel. Pers. Commun., 2015

IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes.
Secur. Commun. Networks, 2015

Multi-party quantum private comparison with an almost-dishonest third party.
Quantum Inf. Process., 2015

Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs.
Inf. Technol. Control., 2015

Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography.
IACR Cryptol. ePrint Arch., 2015

A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system.
Comput. Secur., 2015

2014
Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets.
Wirel. Pers. Commun., 2014

2013
Provably secure mutual authentication and key agreement scheme with user anonymity.
Proceedings of the 9th International Conference on Information, 2013


  Loading...