Samiran Bag

Orcid: 0000-0002-3501-0829

According to our database1, Samiran Bag authored at least 35 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities.
IACR Cryptol. ePrint Arch., 2023

Owl: An Augmented Password-Authenticated Key Exchange Scheme.
IACR Cryptol. ePrint Arch., 2023

2022
End-to-end verifiable cumulative voting without tallying authorities.
Int. J. Appl. Cryptogr., 2022

A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks.
ACM Trans. Cyber Phys. Syst., 2021

Sharing is Caring: A collaborative framework for sharing security alerts.
Comput. Commun., 2021

2020
Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network.
IEEE Trans. Ind. Informatics, 2020

SEAL: Sealed-Bid Auction Without Auctioneers.
IEEE Trans. Inf. Forensics Secur., 2020

privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams.
IEEE Trans. Emerg. Top. Comput., 2020

A Smart Contract System for Decentralized Borda Count Voting.
IEEE Trans. Engineering Management, 2020

Decentralized Self-Enforcing Trust Management System for Social Internet of Things.
IEEE Internet Things J., 2020

End-to-End Verifiable E-Voting Trial for Polling Station Voting.
IEEE Secur. Priv., 2020

End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead.
IACR Cryptol. ePrint Arch., 2020

2019
TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks.
IEEE Internet Things J., 2019

PriVeto: a fully private two-round veto protocol.
IET Inf. Secur., 2019

E2E Verifiable Electronic Voting System for Shareholders.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

E2E Verifiable Borda Count Voting System without Tallying Authorities.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
PrivBox: Verifiable decentralized reputation system for online marketplaces.
Future Gener. Comput. Syst., 2018

A privacy-aware decentralized and personalized reputation system.
Comput. Secur., 2018

M2M-REP: Reputation system for machines in the internet of things.
Comput. Secur., 2018

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Bitcoin Block Withholding Attack: Analysis and Mitigation.
IEEE Trans. Inf. Forensics Secur., 2017

Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network.
Proceedings of the Symposium on Applied Computing, 2017

M2M-REP: Reputation of Machines in the Internet of Things.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools.
Proceedings of the Information Security - 19th International Conference, 2016

Retricoin: Bitcoin based on compact proofs of retrievability.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

2015
A New Key Predistribution Scheme for Grid-Group Deployment of Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015

On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2013
A new key predistribution scheme for general and grid-group deployment of wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2013

Two channel hopping schemes for jamming resistant wireless communication.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach.
Proceedings of the Information Systems Security - 9th International Conference, 2013

2012
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks.
Proceedings of the Information Security - 15th International Conference, 2012

2011
Highly Resilient Communication Using Affine Planes for Key Predistribution and Reed Muller Codes for Connectivity in Wireless Sensor Network.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

Key Distribution in Wireless Sensor Networks Using Finite Affine Plane.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011


  Loading...