Suman Bala

According to our database1, Suman Bala authored at least 17 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
On the Security of Authenticated Group Key Agreement Protocols.
Scalable Comput. Pract. Exp., 2019

A twofold group key agreement protocol for NoC-based MPSoCs.
Trans. Emerg. Telecommun. Technol., 2019

Separate session key generation approach for network and application flows in LoRaWAN.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

2018
Impersonation attack on CertificateLess key agreement protocol.
Int. J. Ad Hoc Ubiquitous Comput., 2018

2017
PF-IBS: Pairing-Free Identity Based Digital Signature Algorithm for Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

Introduction to the Special Issue on Secure Solutions for Network in Scalable Computing.
Scalable Comput. Pract. Exp., 2017

Authenticated Group Key Agreement Protocol Without Pairing.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks.
Int. J. Netw. Secur., 2016

A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2016

On the weight distributions of some q-ary cyclic codes.
Ars Comb., 2016

The weight distributions of some binary cyclic codes.
Ars Comb., 2016

2015
Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

2013
On the Security of Certificateless Signature Schemes.
Int. J. Distributed Sens. Networks, 2013

2012
An Identity-Based Ring Signcryption Scheme.
Proceedings of the International Conference on IT Convergence and Security, 2012

An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks.
Proceedings of the International Conference on IT Convergence and Security, 2012

A survey and taxonomy of symmetric key management schemes for wireless sensor networks.
Proceedings of the CUBE International IT Conference & Exhibition, 2012


  Loading...