G. P. Biswas
Affiliations:- Indian School of Mines, Dhanbad, India
- Indian Institute of Technology, Kharagpur, India
According to our database1,
G. P. Biswas
authored at least 96 papers
between 1995 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on iitism.ac.in
On csauthors.net:
Bibliography
2023
ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet.
Wirel. Pers. Commun., September, 2023
2021
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography.
J. Supercomput., 2021
Int. J. Ad Hoc Ubiquitous Comput., 2021
Design of a secure file storage and access protocol for cloud-enabled Internet of Things environment.
Comput. Electr. Eng., 2021
A Genetic Algorithm-Based Metaheuristic Approach for Test Cost Optimization of 3D SIC.
IEEE Access, 2021
2020
J. Electron. Test., 2020
Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure.
Comput. Commun., 2020
Heuristic Approach for Identification of Random TSV Defects in 3D IC During Pre-bond Testing.
Proceedings of the 29th IEEE Asian Test Symposium, 2020
2019
Wirel. Networks, 2019
Efficient and secure business model for content centric network using elliptic curve cryptography.
Int. J. Commun. Syst., 2019
Provably secure and authenticated data sharing protocol for IoT-based crowdsensing network.
Trans. Emerg. Telecommun. Technol., 2019
An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice.
Computing, 2019
2018
J. Intell. Fuzzy Syst., 2018
Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018
A novel and efficient lattice-based authenticated key exchange protocol in C-K model.
Int. J. Commun. Syst., 2018
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment.
Future Gener. Comput. Syst., 2018
A robust and anonymous patient monitoring system using wireless medical sensor networks.
Future Gener. Comput. Syst., 2018
Trans. Emerg. Telecommun. Technol., 2018
Ad Hoc Networks, 2018
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018
Hierarchy-based cheating detection and cheater identification in secret sharing schemes.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018
2017
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Design of authentication protocol for wireless sensor network-based smart vehicular system.
Veh. Commun., 2017
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
J. Medical Syst., 2017
A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication.
J. King Saud Univ. Comput. Inf. Sci., 2017
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments.
J. King Saud Univ. Comput. Inf. Sci., 2017
Int. J. Inf. Secur. Priv., 2017
Int. J. Commun. Syst., 2017
An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Commun. Syst., 2017
A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017
Int. J. Bus. Data Commun. Netw., 2017
Proceedings of the Mathematics and Computing - Third International Conference, 2017
2016
Wirel. Pers. Commun., 2016
Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme.
Secur. Commun. Networks, 2016
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
Secur. Commun. Networks, 2016
Int. J. Ad Hoc Ubiquitous Comput., 2016
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks.
Comput. Networks, 2016
Analysis and enhancement of pair-wise code assignment scheme used in Code Division Multiple Access protocol.
Comput. Electr. Eng., 2016
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks.
Ad Hoc Networks, 2016
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016
ICTCS, 2016
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
2015
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
Wirel. Pers. Commun., 2015
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment.
Wirel. Pers. Commun., 2015
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Syst., 2015
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.
J. Medical Syst., 2015
An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2015
An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.
J. Medical Syst., 2015
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
J. Medical Syst., 2015
A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS.
J. Medical Syst., 2015
Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system.
J. King Saud Univ. Comput. Inf. Sci., 2015
J. Cases Inf. Technol., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks.
Proceedings of the 2015 International Conference on Cyber Situational Awareness, 2015
Proceedings of the 2015 International Conference on Information Technology, 2015
2014
A Certificate Authority (CA)-based cryptographic solution for HIPAA privacy/security regulations.
J. King Saud Univ. Comput. Inf. Sci., 2014
Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2014
A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2014
Design of an efficient mobile health system for achieving HIPAA privacy-security regulations.
Int. J. Wirel. Mob. Comput., 2014
Proceedings of the Recent Advances in Information Technology, 2014
Proceedings of the Recent Advances in Information Technology, 2014
Proceedings of the Recent Advances in Information Technology, 2014
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
TCA-PCA based hybrid code assignment for enhancement and easy deployability of CDMA protocol.
Proceedings of the 2014 International Conference on Advances in Computing, 2014
2013
Design of improved password authentication and update scheme based on elliptic curve cryptography.
Math. Comput. Model., 2013
Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings.
J. King Saud Univ. Comput. Inf. Sci., 2013
Int. J. Commun. Networks Distributed Syst., 2013
Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2013
2012
Comput. Electr. Eng., 2012
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks.
Ann. des Télécommunications, 2012
Design and implementation of an enhanced rate adaptation scheme for wireless LAN Ieee-802.11.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012
Node-blockage reduction and removal of hidden-terminal problem of CSMA/CA MAC protocol.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012
Optimization of multiple objectives and topological design of data networks using genetic algorithm.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012
Certificateless strong designated verifier multisignature scheme using bilinear pairings.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Proceedings of the Second International Conference on Computational Science, 2012
2011
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
J. Syst. Softw., 2011
Inf. Secur. J. A Glob. Perspect., 2011
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS.
Int. J. Handheld Comput. Res., 2011
Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling of Codebook and Index Matrix
CoRR, 2011
Proceedings of the International Conference on Recent Trends in Information Systems, 2011
Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment.
Proceedings of the Advances in Computing and Communications, 2011
2010
Proceedings of the International Conference on Data Storage and Data Engineering, 2010
2008
Modification of Channel Based IP Multicasting to Support Many to Many Communications.
Proceedings of the 2008 International Conference on Internet Computing, 2008
2000
Theory and Application of GF(2p) Cellular Automata as On-chip Test Pattern Generator.
Proceedings of the 13th International Conference on VLSI Design (VLSI Design 2000), 2000
1997
Proceedings of the 10th International Conference on VLSI Design (VLSI Design 1997), 1997
Proceedings of the 10th International Conference on VLSI Design (VLSI Design 1997), 1997
1995
Proceedings of the 4th Asian Test Symposium (ATS '95), 1995