Bimal K. Roy

Orcid: 0000-0002-8944-3726

According to our database1, Bimal K. Roy authored at least 45 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the feasibility of E2E verifiable online voting - A case study from Durga Puja trial.
J. Inf. Secur. Appl., 2024

Access Structure Hiding Verifiable Tensor Designs.
IACR Cryptol. ePrint Arch., 2024

2023
Strategic Analysis of Griefing Attack in Lightning Network.
IEEE Trans. Netw. Serv. Manag., June, 2023

2022
Strategic Analysis to defend against Griefing Attack in Lightning Network.
CoRR, 2022

2021
A secure end-to-end verifiable e-voting system using blockchain and cloud server.
J. Inf. Secur. Appl., 2021

An Improved Scheduling Algorithm for Traveling Tournament Problem with Maximum Trip Length Two.
Proceedings of the 21st Symposium on Algorithmic Approaches for Transportation Modelling, 2021

2020
A Smart Contract System for Decentralized Borda Count Voting.
IEEE Trans. Engineering Management, 2020

2018
A secure end-to-end verifiable e-voting system using zero knowledge based blockchain.
IACR Cryptol. ePrint Arch., 2018

2015
A Semiparametric Software Reliability Model for Analysis of a Bug-Database With Multiple Defect Types.
Technometrics, 2015

Hypothesis testing and decision theoretic approach for fault detection in wireless sensor networks.
Int. J. Parallel Emergent Distributed Syst., 2015

2014
Model Selection Approach for Distributed Fault Detection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

2013
Method to secure data in the cloud while preserving summary statistics.
IACR Cryptol. ePrint Arch., 2013

A new key predistribution scheme for general and grid-group deployment of wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2013

Two channel hopping schemes for jamming resistant wireless communication.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach.
Proceedings of the Information Systems Security - 9th International Conference, 2013

2012
Combinatorial batch codes: A lower bound and optimal constructions.
Adv. Math. Commun., 2012

2011
Applications of visual cryptography.
Int. J. Parallel Emergent Distributed Syst., 2011

Key pre-distribution using partially balanced designs in wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2011

2009
Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks.
ACM Trans. Sens. Networks, 2009

Revisiting Key Predistribution using Transversal Designs for a Grid-based Deployment Scheme.
Int. J. Distributed Sens. Networks, 2009

Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
More on Combinatorial Batch Codes
CoRR, 2008

Key Predistribution Using Transversal Design on a Grid of Wireless Sensor Network.
Ad Hoc Sens. Wirel. Networks, 2008

Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes.
Proceedings of the Security in Information Systems, 2008

A New Key-Predistribution Scheme for Highly Mobile Sensor Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Key Predistribution Schemes Using Codes in Wireless Sensor Networks.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Applications of Partially Balanced Incomplete Block Designs in Developing (2, <i>n</i>) Visual Cryptographic Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

2006
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design.
Int. J. Inf. Sec., 2006

Foreword.
Discret. Math., 2006

2005
Clique Size in Sensor Networks with Key Pre-distribution Based on Transversal Design.
Int. J. Distributed Sens. Networks, 2005

A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks.
Proceedings of the Information Systems Security, First International Conference, 2005

2004
Characterization of catastrophic faults in two-dimensional reconfigurable systolic arrays with unidirectional links.
Inf. Process. Lett., 2004

On characterization of catastrophic faults in two-dimensional VLSI arrays.
Integr., 2004

Reliability of VLSI Linear Arrays with Redundant Links.
Proceedings of the Distributed Computing, 2004

A New Black and White Visual Cryptographic Scheme for General Access Structures.
Proceedings of the Progress in Cryptology, 2004

2003
Preface: Volume 15.
Electron. Notes Discret. Math., 2003

A Fast Correlation Attack for LFSR-Based Stream Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
On enumeration of catastrophic fault patterns.
Inf. Process. Lett., 2002

Summarising recent results on finding multiples of primitive polynomials over GF(2).
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

A Brief Outline of Research on Correlation Immune Functions.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Enumerating catastrophic fault patterns in VLSI arrays with both uni- and bidirectional links.
Integr., 2001

1999
Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function.
Proceedings of the Advances in Cryptology, 1999

1997
Construction of Symmetric Balanced Squares.
Ars Comb., 1997

VLSI Implementation of Modulo Multiplication Using Carry Free Addition.
Proceedings of the 10th International Conference on VLSI Design (VLSI Design 1997), 1997


  Loading...