Somanath Tripathy

Orcid: 0000-0002-6964-2648

According to our database1, Somanath Tripathy authored at least 99 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Efficient Method and Hardware System for Monitoring of Illegal Logging Events in Forest.
IEEE Syst. J., March, 2024

Privacy-preserving and Byzantine-robust Federated Learning Framework using Permissioned Blockchain.
Expert Syst. Appl., March, 2024

BASPED: Blockchain assisted searchable public key encryption over outsourced data.
Int. J. Inf. Sec., February, 2024

Beyond data poisoning in federated learning.
Expert Syst. Appl., January, 2024

2023
An Efficient Blockchain Assisted Reputation Aware Decentralized Federated Learning Framework.
IEEE Trans. Netw. Serv. Manag., September, 2023

Multi-objective optimization with majority voting ensemble of classifiers for prediction of HIV-1 protease cleavage site.
Soft Comput., 2023

Restricting data-leakage using fine-grained access control on OSN objects.
Int. J. Inf. Sec., 2023

SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
Proceedings of the Information Security Practice and Experience, 2023

Integrating Multi-view Feature Extraction and Fuzzy Rank-Based Ensemble for Accurate HIV-1 Protease Cleavage Site Prediction.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

MDLDroid: Multimodal Deep Learning Based Android Malware Detection.
Proceedings of the Information Systems Security - 19th International Conference, 2023

FlexiPCN: Flexible Payment Channel Network.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

2022
CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage.
J. Supercomput., 2022

SIoVChain: Time-Lock Contract Based Privacy-Preserving Data Sharing in SIoV.
IEEE Trans. Intell. Transp. Syst., 2022

PassMon: A Technique for Password Generation and Strength Estimation.
J. Netw. Syst. Manag., 2022

HIV-1 Protease Cleavage Site Prediction using Stacked Autoencoder with Ensemble of Classifiers.
Proceedings of the International Joint Conference on Neural Networks, 2022

A Multi-modal Graph Convolutional Network for Predicting Human Breast Cancer Prognosis.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

SHIELD: A Multimodal Deep Learning Framework for Android Malware Detection.
Proceedings of the Information Systems Security - 18th International Conference, 2022

MILSA: Model Interpretation Based Label Sniffing Attack in Federated Learning.
Proceedings of the Information Systems Security - 18th International Conference, 2022

MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social Internet of Vehicle.
Proceedings of the IEEE Global Communications Conference, 2022

Delay Aware Fault-Tolerant Concurrent Data Collection Trees in Shared IIoT Applications.
Proceedings of the IEEE Global Communications Conference, 2022

Hidden Vulnerabilities in Cosine Similarity based Poisoning Defense.
Proceedings of the 56th Annual Conference on Information Sciences and Systems, 2022

BSMFS: Blockchain assisted Secure Multi-keyword Fuzzy Search over Encrypted Data.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage.
IEEE Trans. Serv. Comput., 2021

Privacy-preserving Decentralized Learning Framework for Healthcare System.
ACM Trans. Multim. Comput. Commun. Appl., 2021

SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys.
IEEE Trans. Emerg. Top. Comput., 2021

Effective Visibility Prediction on Online Social Network.
IEEE Trans. Comput. Soc. Syst., 2021

Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF.
J. Hardw. Syst. Secur., 2021

SEPS: Efficient public-key based secure search over outsourced data.
J. Inf. Secur. Appl., 2021

MARPUF: physical unclonable function with improved machine learning attack resistance.
IET Circuits Devices Syst., 2021

n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks.
Comput. Secur., 2021

PJ-Sec: secure node joining in mobile P2P networks.
CCF Trans. Pervasive Comput. Interact., 2021

ADAM: Automatic Detection of Android Malware.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

TRGP: A Low-Cost Re-Configurable TRNG-PUF Architecture for IoT.
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021

Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learning.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

DNet: An Efficient Privacy-Preserving Distributed Learning Framework for Healthcare Systems.
Proceedings of the Distributed Computing and Internet Technology, 2021

Beyond Uber and Lyft: A Decentralized Cab Consortium over Blockchains.
Proceedings of the BSCI '21: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021

Multiple RPL Objective Functions for Heterogeneous IoT Networks.
Proceedings of the Advanced Information Networking and Applications, 2021

Fault-Tolerant Concurrent Data collection Trees for Industrial IoT Applications.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021

2020
AppMonitor: restricting information leakage to third-party applications.
Soc. Netw. Anal. Min., 2020

Correlation Power Analysis of KASUMI and Power Resilience Analysis of Some Equivalence Classes of KASUMI S-Boxes.
J. Hardw. Syst. Secur., 2020

SEDS: secure and efficient server-aided data deduplication scheme for cloud storage.
Int. J. Inf. Sec., 2020

Enhancing quality of experience using peer-to-peer overlay on device-to-device communications.
Int. J. Commun. Syst., 2020

Collaborative Learning Based Effective Malware Detection System.
Proceedings of the ECML PKDD 2020 Workshops, 2020

A secure task-offloading framework for cooperative fog computing environment.
Proceedings of the IEEE Global Communications Conference, 2020

MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
CookieArmor : Safeguarding against cross-site request forgery and session hijacking.
Secur. Priv., 2019

Correlation power analysis and effective defense approach on light encryption device block cipher.
Secur. Priv., 2019

Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework.
CoRR, 2019

InfoRest: Restricting Privacy Leakage to Online Social Network App.
CoRR, 2019

Robust Node ID Assignment for Mobile P2P Networks.
CoRR, 2019

Enhancing Quality of Experience using DHT Overlay on Device-to-Device Communications in LTE-A Networks.
CoRR, 2019

A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets.
IEEE Access, 2019

An Intrusion Detection System Using Unsupervised Feature Selection.
Proceedings of the TENCON 2019, 2019

Blind Detection and Classification Algorithm for Smart Audio Monitoring System.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2019

KeySED: An Efficient Keyword based Search over Encrypted Data in Cloud Environment.
Proceedings of the International Conference on Data Science and Engineering, 2019

Secure Multicast Communication Techniques for IoT.
Proceedings of the Security and Fault Tolerance in Internet of Things, 2019

2018
eBot: Approach Towards Modeling an Advanced P2P Botnet.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Correlation Power Analysis on KASUMI: Attack and Countermeasure.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018

Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

V-Chord: An efficient file sharing on LTE/GSM Network.
Proceedings of the 19th International Conference on Distributed Computing and Networking, 2018

GMP2P: Mobile P2P over GSM for Efficient File Sharing.
Proceedings of the Distributed Computing and Internet Technology, 2018

Epidemic model based visibility estimation in Online Social Networks.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Blockchain based Security Framework for P2P Filesharing system.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
A trust-based collaborative access control model with policy aggregation for online social networks.
Soc. Netw. Anal. Min., 2017

CAP: collaborative attack on pastry.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy.
Proceedings of the Network and System Security - 11th International Conference, 2017

SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage.
Proceedings of the Information Systems Security - 13th International Conference, 2017

2016
Secure Multicast Routing Algorithm for Wireless Mesh Networks.
J. Comput. Networks Commun., 2016

Privacy Preserving Provable Data Possession for Cloud Based Electronic Health Record System.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Collaborative Access Control Mechanism for Online Social Networks.
Proceedings of the Distributed Computing and Internet Technology, 2016

2015
S-Gossip: Security Enhanced Gossip Protocol for Unstructured P2P Networks.
Proceedings of the Distributed Computing and Internet Technology, 2015

Predicting User Visibility in Online Social Networks Using Local Connectivity Properties.
Proceedings of the Distributed Computing and Internet Technology, 2015

2014
eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version).
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Provably Secure Routing Protocol for Wireless Mesh Networks.
Int. J. Netw. Secur., 2014

eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy.
Proceedings of the Network and System Security - 8th International Conference, 2014

Provably secure Peer-link establishment protocol for wireless mesh networks.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

TabSol: An Efficient Framework to Defend Tabnabbing.
Proceedings of the 2014 International Conference on Information Technology, 2014

2013
Improved heuristics for multicast routing in wireless mesh networks.
Wirel. Networks, 2013

ESF: an efficient security framework for wireless sensor network.
Int. J. Commun. Networks Distributed Syst., 2013

WRSR: wormhole-resistant secure routing for wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2013

AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
WAKE: Authentication and Key Establishment for Wireless Mesh Network.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Defence against Wormhole Attacks in Wireless Mesh Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012

SEPastry: Security Enhanced Pastry.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Reliability Enhanced Routing Protocol for Wireless Mesh Networks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Secure Peer-Link Establishment in Wireless Mesh Networks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
THWMP: trust based secure routing for wireless mesh networks.
Proceedings of the 2011 International Conference on Communication, 2011

FRI-attack: fraduelent routing information attack on wireless mesh network.
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011

2010
Tin-Key: Effective Key-Establishment for Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption.
Int. J. Netw. Secur., 2009

Effective pair-wise key establishment scheme for wireless sensor networks.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

2008
Secure user-identification and key distribution scheme preserving anonymity.
Int. J. Secur. Networks, 2008

Defense against outside attacks in wireless sensor networks.
Comput. Commun., 2008

2007
LISA: LIghtweight Security Algorithm for Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007

Securing Wireless Sensor Networks Against Spurious Injections.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

OSASMAC: Opportunistic Secure Adaptive Sensor MAC Protocol.
Proceedings of the 10th International Conference on Information Technology, 2007

2006
Efficient Remote User Authentication and Key Establishment for Multi-server Environment.
Proceedings of the Distributed Computing and Internet Technology, 2006

CARA: Cellular automata based remote-user authentication scheme.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

CARMA: Cellular Automata Based Remote Mutual Authentication Scheme.
Proceedings of the 9th International Conference in Information Technology, 2006


  Loading...