Satya Bagchi

Orcid: 0000-0001-7588-9973

Affiliations:
  • NIT Durgapur, West Bengal, India


According to our database1, Satya Bagchi authored at least 23 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secret sharing based RFID protocol using ECC for TMIS.
Peer Peer Netw. Appl., March, 2024

2023
Quadratic residue-based unilateral authentication protocol for RFID system.
Multim. Tools Appl., May, 2023

LCD matrix product codes with an application.
Discret. Math. Algorithms Appl., May, 2023

Linear complementary pair of codes based lightweight RFID protocol.
Comput. Commun., 2023

MDS Code Based Ultralightweight Authentication Protocol for RFID System.
IEEE Access, 2023

Optimal Constructions of LRCs based on Cayley Table.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

A Verifiable Secret Sharing Scheme using Elliptic Curve Cryptography.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2022
Classification and count of binary linear complementary dual group codes.
CoRR, 2022

Some Properties and Constructions of Weakly Self Dual LRCs.
Proceedings of the IEEE International Conference on Signal Processing and Communications, 2022

2021
A Class of (n, k, r, t) IS-LRCs Via Parity Check Matrix.
CoRR, 2021

Linear complementary dual code-based Multi-secret sharing scheme.
CoRR, 2021

2020
Cyclic group based mutual authentication protocol for RFID system.
Wirel. Networks, 2020

Binary Galois field based asynchronous scheduling protocol for delay tolerant networks.
Wirel. Networks, 2020

Do non-free LCD codes over finite commutative Frobenius rings exist?
Des. Codes Cryptogr., 2020

2019
Cyclic codes over $${\mathcal {M}}_4({\mathbb {F}}_2$$ M 4 ( F 2 ).
J. Appl. Math. Comput., June, 2019

2018
A Secure PUF-Based Unilateral Authentication Scheme for RFID System.
Wirel. Pers. Commun., 2018

Self-dual cyclic codes over M<sub>2</sub>(ℤ<sub>4</sub>).
CoRR, 2018

On decoding procedures of intertwining codes.
CoRR, 2018

On maximum distance separable group codes with complementary duals.
CoRR, 2018

2017
A Coding Theory Based Ultralightweight RFID Authentication Protocol with CRC.
Wirel. Pers. Commun., 2017

Generalized twisted centralizer codes.
CoRR, 2017

2014
Design of an efficient load balancing algorithm using the symmetric balanced incomplete block design.
Inf. Sci., 2014

2009
On a new code, [2<sup>n</sup>-1, n, 2<sup>n-1</sup>].
Discret. Appl. Math., 2009


  Loading...