Santanu Chatterjee

According to our database1, Santanu Chatterjee authored at least 31 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through SIP.
Int. J. Secur. Networks, 2022

Privacy in content-centric networking against side channel attacks.
Int. J. Secur. Networks, 2022

2020
A secure three factor-based fully anonymous user authentication protocol for multi-server environment.
Int. J. Ad Hoc Ubiquitous Comput., 2020

2019
Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.
IEEE Trans. Ind. Informatics, 2019

A New Approach for Conceptual Extraction-Transformation-Loading Process Modeling.
Int. J. Ambient Comput. Intell., 2019

2018
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment.
IEEE Trans. Dependable Secur. Comput., 2018

An efficient biometric based remote user authentication scheme for secure internet of things environment.
J. Intell. Fuzzy Syst., 2018

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
IEEE Internet Things J., 2018

An efficient fine-grained access control scheme for hierarchical wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018

An efficient dynamic access control scheme for distributed wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018

Secure Biometric-Based Authentication Protocol for Vehicular Ad-Hoc Network.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2018

Design and Implementation of an Improved Data Warehouse on Clinical Data.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

2017
On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services.
IEEE Access, 2017

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017

SysML Based Conceptual ETL Process Modeling.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

2016
A biometrics-based robust and secure user authentication protocol for e-healthcare service.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2015
An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks.
Secur. Commun. Networks, 2015

A secure and effective access control scheme for distributed wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2015

A New Biometric-Based Remote User Authentication Scheme in Hierarchical Wireless Body Area Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015

Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015

2014
A novel and efficient user access control scheme for wireless body area sensor networks.
J. King Saud Univ. Comput. Inf. Sci., 2014

Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks.
Int. J. Trust. Manag. Comput. Commun., 2014

A survey on user access control in wireless sensor networks with formal security verification.
Int. J. Trust. Manag. Comput. Commun., 2014

An Enhanced Access Control Scheme in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014

Cryptanalysis and enhancement of a distributed fine-grained access control in wireless sensor networks.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
A Novel Efficient Access Control Scheme for Large-Scale Distributed Wireless Sensor Networks.
Int. J. Found. Comput. Sci., 2013

Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

2012
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks.
J. Netw. Comput. Appl., 2012

2010
Modeling Conformational Ensembles of Slow Functional Motions in Pin1-WW.
PLoS Comput. Biol., 2010

MDLab: A molecular dynamics simulation prototyping environment.
J. Comput. Chem., 2010

2004
MPI-implementation of PFI-code for numerical modeling of the anatomy of breast cancer.
Int. J. Comput. Math., 2004


  Loading...