Debojyoti Bhattacharya

According to our database1, Debojyoti Bhattacharya authored at least 9 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Algorithmic study on liar's vertex-edge domination problem.
J. Comb. Optim., October, 2024

2023
On k-vertex-edge domination of graph.
CoRR, 2023

2014
New algorithms for batch verification of standard ECDSA signatures.
J. Cryptogr. Eng., 2014

2012
Autonomous Certification with List-Based Revocation for Secure V2V Communication.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Batch Verification of ECDSA Signatures.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2009
Reliable and secure broadcast communication over resource constrained systems.
Proceedings of the 4th International Conference on Performance Evaluation Methodologies and Tools, 2009

2007
A Near Optimal S-Box Design.
Proceedings of the Information Systems Security, Third International Conference, 2007

Strengthening NLS Against Crossword Puzzle Attack.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and Its Application to RS-Coded MPSK Modulation.
Proceedings of the Cellular Automata, 2006


  Loading...