Debasis Giri
Orcid: 0000-0003-3033-3036
According to our database1,
Debasis Giri
authored at least 66 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Varied offspring memetic algorithm with three parents for a realistic synchronized goods delivery and service problem.
Soft Comput., March, 2024
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey.
Secur. Priv., 2024
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection.
Multim. Tools Appl., 2024
Multi-objective brainstorm optimization algorithm based on Bayesian inference learning automaton for solving CVRP with time windows.
Appl. Soft Comput., 2024
2023
Emergent multipath COVID-19 specimen collection problem with green corridor through variable length GA.
Expert Syst. Appl., December, 2023
Multipath traveling purchaser problem with time-dependent market structure using quantum-inspired variable length genetic algorithm.
Comput. Ind. Eng., December, 2023
Optimum Node Deployment Policy (ONDP) for WSN: Trade-off Between Maximization of Area Coverage and Lifetime.
Wirel. Pers. Commun., November, 2023
Style matching CAPTCHA: match neural transferred styles to thwart intelligent attacks.
Multim. Syst., August, 2023
A new robust and fragile scheme based on chaotic maps and dwt for medical image security.
Multim. Tools Appl., March, 2023
SMSDect: A Prediction Model for Smishing Attack Detection Using Machine Learning and Text Analysis.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the OITS International Conference on Information Technology, 2023
2022
Chaotic neural networks and farfalle construction based parallel keyed secure hash function.
Secur. Priv., 2022
Multim. Tools Appl., 2022
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2022
Proceedings of the Green Mobile Cloud Computing, 2022
2021
IEEE Trans. Consumer Electron., 2021
IEEE Syst. J., 2021
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters.
J. Syst. Archit., 2021
Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map.
J. Inf. Secur. Appl., 2021
AI and Blockchain-Based Cloud-Assisted Secure Vaccine Distribution and Tracking in IoMT-Enabled COVID-19 Environment.
IEEE Internet Things Mag., 2021
Mobile Edge Computing, 2021
2020
A robust authentication and access control protocol for securing wireless healthcare sensor networks.
J. Inf. Secur. Appl., 2020
A Geometric-Based User Authentication Scheme for Multi-server Architecture: Cryptanalysis and Enhancement.
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020
2019
Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN.
IEEE Syst. J., 2019
M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes.
IEEE Syst. J., 2019
ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications.
IET Networks, 2019
SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol.
Cryptologia, 2019
Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
Proceedings of the Recent Advances in Intelligent Information Systems and Applied Mathematics, 2019
4-Dimensional Transportation Problem for Substitute and Complementary Items Under Rough Environment.
Proceedings of the Recent Advances in Intelligent Information Systems and Applied Mathematics, 2019
2018
Linear-feedback shift register-based multi-ant cellular automation and chaotic map-based image encryption.
Secur. Priv., 2018
Multim. Tools Appl., 2018
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018
Proceedings of the Mathematics and Computing - 4th International Conference, 2018
2017
Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card.
Wirel. Pers. Commun., 2017
A software agent enabled biometric security algorithm for secure file access in consumer storage devices.
IEEE Trans. Consumer Electron., 2017
Secur. Commun. Networks, 2017
Multim. Tools Appl., 2017
A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Commun. Syst., 2017
Proceedings of the Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30, 2017
Proceedings of the Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30, 2017
SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB Mass Storage Devices.
IEEE Trans. Consumer Electron., 2016
Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Secur. Commun. Networks, 2016
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
Secur. Commun. Networks, 2016
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Secur. Commun. Networks, 2016
An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card.
Int. J. Netw. Secur., 2016
Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion.
Int. J. Netw. Secur., 2016
2015
Efficient biometric and password based mutual authentication for consumer USB mass storage devices.
IEEE Trans. Consumer Electron., 2015
An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems.
J. Medical Syst., 2015
SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs.
Int. J. Inf. Commun. Technol., 2015
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015
2014
An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment.
J. Medical Syst., 2014
2013
Probabilistic Approach-Based Congestion-Aware Swarm-Inspired Load-Balancing Multipath Data Routing in MANETs.
Proceedings of the Intelligent Computing, 2013
2011
2010
Proceedings of the Information Security and Assurance - 4th International Conference, 2010
2008
A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security.
Int. J. Netw. Secur., 2008
Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
2007
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies.
Int. J. Netw. Secur., 2007
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the 10th International Conference on Information Technology, 2007
2006
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2006
2003
SIGMOD Rec., 2003