Manik Lal Das
Orcid: 0000-0002-1218-4041
According to our database1,
Manik Lal Das
authored at least 106 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Computing, October, 2024
2022
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption.
IEEE Trans. Serv. Comput., 2022
Inf. Secur. J. A Glob. Perspect., 2022
Future Gener. Comput. Syst., 2022
Comput. Secur., 2022
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2022
2021
IEEE Trans. Cloud Comput., 2021
Int. J. Soc. Comput. Cyber Phys. Syst., 2021
Int. J. Soc. Comput. Cyber Phys. Syst., 2021
Int. J. Soc. Comput. Cyber Phys. Syst., 2021
Proceedings of the IEEE International Conference on Communications Workshops, 2021
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021
2020
Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications.
Wirel. Pers. Commun., 2020
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020
Proceedings of the Distributed Computing and Internet Technology, 2020
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020
2019
Int. J. Soc. Comput. Cyber Phys. Syst., 2019
Int. J. Multim. Intell. Secur., 2019
Proceedings of the Information Security Theory and Practice, 2019
Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding.
Proceedings of the Distributed Computing and Internet Technology, 2019
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019
2018
Int. J. Comput. Vis. Image Process., 2018
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Proceedings of the Distributed Computing and Internet Technology, 2018
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018
2017
Comput. Commun., 2017
Proceedings of the Mathematics and Computing - Third International Conference, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Distributed Computing and Internet Technology, 2017
Proceedings of the Distributed Computing and Internet Technology, 2017
On the verification of conjunctive keyword search results using authenticated crawlers.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017
2016
IACR Cryptol. ePrint Arch., 2016
On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems".
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Groups Complex. Cryptol., 2015
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Security in Computing and Communications, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network.
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Distributed Computing and Internet Technology, 2015
2014
Inf. Secur. J. A Glob. Perspect., 2014
Int. J. Wirel. Networks Broadband Technol., 2014
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the 6th ACM India Computing Convention, 2013
2012
Inf. Secur. J. A Glob. Perspect., 2012
Int. J. Comput. Vis. Image Process., 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation.
Proceedings of the Distributed Computing and Internet Technology, 2012
Proceedings of the Distributed Computing and Internet Technology, 2012
Proceedings of the Distributed Computing and Internet Technology, 2012
2011
Cryptologia, 2011
2009
IEEE Trans. Wirel. Commun., 2009
J. Theor. Appl. Electron. Commer. Res., 2009
Comput. Stand. Interfaces, 2009
2008
ACM SIGCSE Bull., 2008
Int. J. Netw. Secur., 2008
IEEE Commun. Lett., 2008
CoRR, 2008
CoRR, 2008
Ad Hoc Sens. Wirel. Networks, 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Efficient user authentication and secure data transmission in wireless sensor networks.
Proceedings of the 16th International Conference on Networks, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008
Proceedings of the 2008 International Conference on Information Technology, 2008
2007
Int. J. Netw. Secur., 2007
Comput. Stand. Interfaces, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Comput. Secur., 2006
2005
ACM SIGOPS Oper. Syst. Rev., 2005
An Effective Certificateless Signature Scheme Based on Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005
ID-based Serial Multisignature Scheme using Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005
Proceedings of the Distributed Computing, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005
2004
IEEE Trans. Consumer Electron., 2004
Proceedings of the Distributed Computing, 2004
2003
IACR Cryptol. ePrint Arch., 2003