Sangram Ray

Orcid: 0000-0002-1920-4172

According to our database1, Sangram Ray authored at least 34 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ECC-EXONUM-eVOTING: A Novel Signature-Based e-Voting Scheme Using Blockchain and Zero Knowledge Property.
IEEE Open J. Commun. Soc., 2024

2023
ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet.
Wirel. Pers. Commun., September, 2023

An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography.
Innov. Syst. Softw. Eng., September, 2023

An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC.
Comput. Commun., September, 2023

Enhanced pairing-free identity-based broadcast authentication protocol in WSN using ElGamal ECC.
Secur. Priv., 2023

Efficient and secure e-voting scheme using elliptic curve cryptography.
Secur. Priv., 2023

A Short Survey on Fog Computing and its Convergence with Internet of Things (IoT) Network.
Proceedings of the OITS International Conference on Information Technology, 2023

SAK-SAE: A Secure Authentication and Key-Exchange Scheme for Smart Agricultural Environment using Fuzzy Extractor.
Proceedings of the OITS International Conference on Information Technology, 2023

2022
Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm.
Wirel. Pers. Commun., 2022

ESOTP: ECC-based secure object tracking protocol for IoT communication.
Int. J. Commun. Syst., 2022

An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing.
Computing, 2022

Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security.
Comput. Commun., 2022

2021
ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things.
Wirel. Pers. Commun., 2021

A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2021

A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography.
J. Supercomput., 2021

A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things.
Peer-to-Peer Netw. Appl., 2021

A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems.
J. Syst. Archit., 2021

A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography.
J. Syst. Archit., 2021

Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things.
J. Inf. Secur. Appl., 2021

An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network.
Trans. Emerg. Telecommun. Technol., 2021

Usage of Blockchain Technology in e-Voting System Using Private Blockchain.
Proceedings of the Intelligent Data Engineering and Analytics, 2021

2020
An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things.
IEEE Syst. J., 2020

An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems.
Int. J. Inf. Sec., 2020

Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure.
Comput. Commun., 2020

Usage of Internet of Things in Home Automation Systems: A Review.
Proceedings of the Modeling, Simulation and Optimization, 2020

2019
Efficient and secure business model for content centric network using elliptic curve cryptography.
Int. J. Commun. Syst., 2019

2018
Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

A Secure Anonymous Mobile Handover Authentication Protocol for Content Centric Network.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

2016
Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2016

2014
A Certificate Authority (CA)-based cryptographic solution for HIPAA privacy/security regulations.
J. King Saud Univ. Comput. Inf. Sci., 2014

Design of an efficient mobile health system for achieving HIPAA privacy-security regulations.
Int. J. Wirel. Mob. Comput., 2014

2012
An ECC based public key infrastructure usable for mobile applications.
Proceedings of the Second International Conference on Computational Science, 2012

2011
Design of Mobile-PKI for using mobile phones in various applications.
Proceedings of the International Conference on Recent Trends in Information Systems, 2011


  Loading...