Daya Sagar Gupta

Orcid: 0000-0001-5401-7287

According to our database1, Daya Sagar Gupta authored at least 33 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Context-Based Persuasion Analysis of Sentiment Polarity Disambiguation in Social Media Text Streams.
New Gener. Comput., November, 2024

Quantum-safe Lattice-based mutual authentication and key-exchange scheme for the smart grid.
Trans. Emerg. Telecommun. Technol., July, 2024

A survey on lattice-based security and authentication schemes for smart-grid networks in the post-quantum era.
Concurr. Comput. Pract. Exp., June, 2024

Rumor identification and diffusion impact analysis in real-time text stream using deep learning.
J. Supercomput., April, 2024

PiLike: Post-Quantum Identity-Based Lightweight Authenticated Key Exchange Protocol for IIoT Environments.
IEEE Syst. J., March, 2024

IoT-ID3PAKA: Efficient and Robust ID-3PAKA Protocol for Resource-Constrained IoT Devices.
IEEE Internet Things J., March, 2024

PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments.
Comput. Networks, January, 2024

Post-quantum attack resilience blockchain-assisted data authentication protocol for smart healthcare system.
Softw. Pract. Exp., 2024

Quantum-resistance blockchain-assisted certificateless data authentication and key exchange scheme for the smart grid metering infrastructure.
Pervasive Mob. Comput., 2024

Quantum-resistant public-key encryption and signature schemes with smaller key sizes.
Clust. Comput., 2024

2023
Correction to: An Improved Certificateless Mutual Authentication and Key Agreement Protocol for Cloud-Assisted Wireless Body Area Networks.
Wirel. Pers. Commun., 2023

An Improved Certificateless Mutual Authentication and Key Agreement Protocol for Cloud-Assisted Wireless Body Area Networks.
Wirel. Pers. Commun., 2023

Secure data authentication and access control protocol for industrial healthcare system.
J. Ambient Intell. Humaniz. Comput., 2023

A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System.
Comput. Commun., 2023

Blockchain-based Secure Storage and Management of Electronic Health Record using a Smart Card.
Proceedings of the 5th International Conference on Recent Advances in Information Technology, 2023

2022
Quantum-Defended Blockchain-Assisted Data Authentication Protocol for Internet of Vehicles.
IEEE Trans. Veh. Technol., 2022

Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security.
Comput. Commun., 2022

Real-time event detection and classification in social text steam using embedding.
Clust. Comput., 2022

SP2P-MAKA: Smart Contract Based Secure P2P Mutual Authentication Key Agreement Protocol for Intelligent Energy System.
Proceedings of the Intelligent Systems Design and Applications - 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022, 2022

2021
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
IEEE Syst. J., 2021

LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments.
IEEE Syst. J., 2021

Efficient and Secure Design of ID-3PAKA Protocol Using ECC.
Proceedings of the International Conference on Computer, 2021

2020
A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2020

2019
An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice.
Computing, 2019

A Secure Identity-based Deniable Authentication Protocol for MANETs.
Proceedings of the 2019 International Conference on Computer, 2019

2018
A novel and efficient lattice-based authenticated key exchange protocol in C-K model.
Int. J. Commun. Syst., 2018

Design of lattice-based ElGamal encryption and signature schemes using SIS problem.
Trans. Emerg. Telecommun. Technol., 2018

Security weakness of a lattice-based key exchange protocol.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

Hierarchy-based cheating detection and cheater identification in secret sharing schemes.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

2017
On Securing Bi- and Tri-partite Session Key Agreement Protocol Using IBE Framework.
Wirel. Pers. Commun., 2017

A Secure Cloud Storage using ECC-Based Homomorphic Encryption.
Int. J. Inf. Secur. Priv., 2017

An ECC-based authenticated group key exchange protocol in IBE framework.
Int. J. Commun. Syst., 2017

2015
Secure Computation on Cloud Storage: A Homomorphic Approach.
J. Cases Inf. Technol., 2015


  Loading...