Sandip Roy

Affiliations:
  • Asansol Engineering College, West Bengal, India, Department of Computer Science and Engineering
  • Old Dominion University, Suffolk, VA, USA, Virginia Modeling, Analysis, and Simulation Center (2021-2023)
  • Jadavpur University, Kolkata, West Bengal, India, Department of Information Technology (PhD, 2019)


According to our database1, Sandip Roy authored at least 25 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-Based Efficient Access Control With Handover Policy in IoV-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., March, 2024

ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications.
IEEE Trans. Netw. Sci. Eng., 2024

2023
Smart Assistance to Reduce the Fear of Falling in Parkinson Patients Using IoT.
Wirel. Pers. Commun., May, 2023

ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks.
IEEE Syst. J., March, 2023

Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme.
IEEE Internet Things J., January, 2023

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges.
Secur. Priv., 2023

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning.
CoRR, 2023

A Novel Smartphone-Based Human Activity Recognition Approach using Convolutional Autoencoder Long Short-Term Memory Network.
Proceedings of the 24th IEEE International Conference on Information Reuse and Integration for Data Science, 2023

2022
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system.
J. Syst. Archit., 2022

DDoS attack resisting authentication protocol for mobile based online social network applications.
J. Inf. Secur. Appl., 2022

2020
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment.
J. Inf. Secur. Appl., 2020

A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications.
IEEE Access, 2020

Cryptanalysis of a Centralized Location-Sharing Scheme for Mobile Online Social Networks.
Proceedings of the Advanced Computing and Systems for Security, 2020

2019
Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.
IEEE Trans. Ind. Informatics, 2019

2018
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment.
IEEE Trans. Dependable Secur. Comput., 2018

An efficient biometric based remote user authentication scheme for secure internet of things environment.
J. Intell. Fuzzy Syst., 2018

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
IEEE Internet Things J., 2018

An efficient fine-grained access control scheme for hierarchical wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018

An efficient dynamic access control scheme for distributed wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018

2017
On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services.
IEEE Access, 2017

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017

2016
A biometrics-based robust and secure user authentication protocol for e-healthcare service.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2015
Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015

2014
Cryptanalysis and enhancement of a distributed fine-grained access control in wireless sensor networks.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2008
Swarm Intelligence Algorithms for Data Clustering.
Proceedings of the Soft Computing for Knowledge Discovery and Data Mining, 2008


  Loading...