Subhas Barman

Orcid: 0000-0002-3206-1110

According to our database1, Subhas Barman authored at least 17 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment.
SN Comput. Sci., March, 2024

Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment.
Secur. Priv., 2024

2023
An appropriate and cost-effective hospital recommender system for a patient of rural area using deep reinforcement learning.
Intell. Syst. Appl., May, 2023

2022
A blockchain-based approach to secure electronic health records using fuzzy commitment scheme.
Secur. Priv., 2022

SHUBHCHINTAK.
Multim. Tools Appl., 2022

2020
Deep Approaches on Malicious URL Classification.
Proceedings of the 11th International Conference on Computing, 2020

2019
Biometric-based cryptography for digital content protection without any key storage.
Multim. Tools Appl., 2019

A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme.
IEEE Access, 2019

2018
Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment.
IEEE Access, 2018

2017
A novel secure key-exchange protocol using biometrics of the sender and receiver.
Comput. Electr. Eng., 2017

Prediction of Diabetes Type-II Using a Two-Class Neural Network.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

2016
A complete literature review on financial fraud detection applying data mining techniques.
Int. J. Trust. Manag. Comput. Commun., 2016

2015
Approach to cryptographic key generation from fingerprint biometrics.
Int. J. Biom., 2015

Fingerprint-based crypto-biometric system for network security.
EURASIP J. Inf. Secur., 2015

2014
An Approach to Cryptographic Key Exchange Using Fingerprint.
Proceedings of the Security in Computing and Communications, 2014

An approach to cryptographic key distribution through fingerprint based key distribution center.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

An Efficient Fingerprint Matching Approach Based on Minutiae to Minutiae Distance Using Indexing with Effectively Lower Time Complexity.
Proceedings of the 2014 International Conference on Information Technology, 2014


  Loading...