Janaka Alawatugoda
Orcid: 0000-0001-9431-5836Affiliations:
- University of Peradeniya, Sri Lanka
- Griffith University, Australia
According to our database1,
Janaka Alawatugoda
authored at least 26 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
2
4
4
1
2
1
2
2
5
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on ce.pdn.ac.lk
On csauthors.net:
Bibliography
2024
Overall Survival Predictions of GBM Patients Using Radiomics: An Explainable AI Approach Using SHAP.
IEEE Access, 2024
2023
Cryptogr., March, 2023
Robust Cross Directional Controller Design for Paper Machine Spatial Distributed System.
IEEE Access, 2023
Mixed-Reality Based Multi-Agent Robotics Framework for Artificial Swarm Intelligence Experiments.
IEEE Access, 2023
Unveiling Copy-Move Forgeries: Enhancing Detection With SuperPoint Keypoint Architecture.
IEEE Access, 2023
2022
Correlation power analysis attack on software implementation of TRIVIUM stream cipher.
Int. J. Inf. Comput. Secur., 2022
Int. J. Inf. Comput. Secur., 2022
Standard model leakage-resilient authenticated key exchange using inner-product extractors.
Des. Codes Cryptogr., 2022
Cryptogr., 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
J. Math. Cryptol., 2020
Comput. J., 2020
2019
Int. J. Commun. Networks Inf. Secur., 2019
2017
Int. J. Inf. Sec., 2017
Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting.
Proceedings of the Provable Security, 2017
Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack.
Proceedings of the 2017 IEEE International Conference on Industrial and Information Systems, 2017
2015
IACR Cryptol. ePrint Arch., 2015
Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model.
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Software implementation level countermeasures against the cache timing attack on advanced encryption standard.
CoRR, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014