Manik Lal Das

Orcid: 0000-0002-1218-4041

According to our database1, Manik Lal Das authored at least 106 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications.
Computing, October, 2024

2022
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption.
IEEE Trans. Serv. Comput., 2022

PAC: Privacy preserving proxy re-encryption for access control in public cloud.
Inf. Secur. J. A Glob. Perspect., 2022

Group data freshness scheme for outsourced data in distributed systems.
Future Gener. Comput. Syst., 2022

Background knowledge attacks in privacy-preserving data publishing models.
Comput. Secur., 2022

Distributed Integrity Auditing of Cloud data using Edge Computing and Blockchain.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2022

2021
Privacy Preserving Searchable Encryption with Fine-Grained Access Control.
IEEE Trans. Cloud Comput., 2021

iCOPS: insider attack detection in distributed file systems.
Int. J. Soc. Comput. Cyber Phys. Syst., 2021

Rule based anonymisation against inference attack in social networks.
Int. J. Soc. Comput. Cyber Phys. Syst., 2021

Secure resource sharing in grid system without public key settings.
Int. J. Soc. Comput. Cyber Phys. Syst., 2021

Edge-enabled Secure Healthcare System.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Fine-grained Data Deduplication and proof of storage Scheme in Public Cloud Storage.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

Data Deduplication Scheme with Multiple Key Servers in Public Clouds.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021

2020
Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications.
Wirel. Pers. Commun., 2020

On Aadhaar Identity Management System.
CoRR, 2020

Web Application Attack Detection using Deep Learning.
CoRR, 2020

GIDS: Anomaly Detection Using Generative Adversarial Networks.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

Transcript Management Using Blockchain Enabled Smart Contracts.
Proceedings of the Distributed Computing and Internet Technology, 2020

Privc: Privacy Preserving Verifiable Computation.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

2019
Detection of Node Capture Attack in Wireless Sensor Networks.
IEEE Syst. J., 2019

Privacy-preserving targeted online advertising.
Int. J. Soc. Comput. Cyber Phys. Syst., 2019

TIDE: tampered image detection using mutual information.
Int. J. Multim. Intell. Secur., 2019

Verifiable and Private Oblivious Polynomial Evaluation.
Proceedings of the Information Security Theory and Practice, 2019

Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding.
Proceedings of the Distributed Computing and Internet Technology, 2019

LandLedger: Blockchain-powered Land Property Administration System.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Securing Digital Image from Malicious Insider Attacks.
Int. J. Comput. Vis. Image Process., 2018

DigiLock: User-controlled and Server-aware Digital Locker System.
CoRR, 2018

On Minimality Attack for Privacy-Preserving Data Publishing.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

MedCop: Verifiable Computation for Mobile Healthcare System.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Auditing Access to Private Data on Android Platform.
Proceedings of the Distributed Computing and Internet Technology, 2018

On the Security of Remote Key Less Entry for Vehicles.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
Verifiable Private Polynomial Evaluation.
IACR Cryptol. ePrint Arch., 2017

Image Authentication using Visual Cryptography.
CoRR, 2017

Mutual healing enabled group-key distribution protocol in Wireless Sensor Networks.
Comput. Commun., 2017

On the Security of a Searchable Anonymous Attribute Based Encryption.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

MalDetec: A Non-root Approach for Dynamic Malware Detection in Android.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Efficient Image Authentication Scheme Using Genetic Algorithms.
Proceedings of the Distributed Computing and Internet Technology, 2017

Privacy Preserving Signcryption Scheme.
Proceedings of the Distributed Computing and Internet Technology, 2017

On the verification of conjunctive keyword search results using authenticated crawlers.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Privacy-preserving services in VANET with misbehavior detection.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
Cryptanalysis of Searchable Anonymous Attribute Based Encryption.
IACR Cryptol. ePrint Arch., 2016

Securing SQL with Access Control for Database as a Service Model.
ICTCS, 2016

On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems".
Proceedings of the Information Systems Security - 12th International Conference, 2016

Node revocation and key update protocol in wireless sensor networks.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
Privacy-preserving Attribute Based Searchable Encryption.
IACR Cryptol. ePrint Arch., 2015

Pairing Based Mutual Healing in Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2015

Key-escrow free multi-signature scheme using bilinear pairings.
Groups Complex. Cryptol., 2015

Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud.
Proceedings of the Security in Computing and Communications, 2015

SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data.
Proceedings of the Information Systems Security - 11th International Conference, 2015

On Anonymous Attribute Based Encryption.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Privacy and Security Challenges in Internet of Things.
Proceedings of the Distributed Computing and Internet Technology, 2015

2014
Secure Patrol: Patrolling Against Buffer Overflow Exploits.
Inf. Secur. J. A Glob. Perspect., 2014

Secure Node Localization in Mobile Sensor Networks.
Int. J. Wirel. Networks Broadband Technol., 2014

Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13.
IACR Cryptol. ePrint Arch., 2014

Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

2013
Wide-weak Privacy Preserving RFID Mutual Authentication Protocol.
IACR Cryptol. ePrint Arch., 2013

Reputation Algebra for Cloud-based Anonymous Data Storage Systems
CoRR, 2013

Strong Security and Privacy of RFID System for Internet of Things Infrastructure.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper).
Proceedings of the Information Systems Security - 9th International Conference, 2013

Improving security and efficiency of time-bound access to outsourced data.
Proceedings of the 6th ACM India Computing Convention, 2013

2012
Code Analysis for Software and System Security Using Open Source Tools.
Inf. Secur. J. A Glob. Perspect., 2012

Digital Image Protection using Keyed Hash Function.
Int. J. Comput. Vis. Image Process., 2012

RFID security in the context of "internet of things".
Proceedings of the First International Conference on Security of Internet of Things, 2012

A Novel Key Update Protocol in Mobile Sensor Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation.
Proceedings of the Distributed Computing and Internet Technology, 2012

Grids Security without Public Key Settings.
Proceedings of the Distributed Computing and Internet Technology, 2012

An Improved Scheme for False Data Filtering in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2012

2011
A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel.
Cryptologia, 2011

2009
Two-factor user authentication in wireless sensor networks.
IEEE Trans. Wirel. Commun., 2009

An Improved and Efficient Micro-payment Scheme.
J. Theor. Appl. Electron. Commer. Res., 2009

Algorithms and Approaches of Proxy Signature: A Survey.
Int. J. Netw. Secur., 2009

An improved bilinear pairing based remote user authentication scheme.
Comput. Stand. Interfaces, 2009

GSM Security Using Identity-based Cryptography
CoRR, 2009

2008
Data and information security (DIS) for BS and MS programs: a proposal.
ACM SIGCSE Bull., 2008

Comments on "Improved Efficient Remote User Authentication Schemes".
Int. J. Netw. Secur., 2008

Dynamic Program Update in Wireless Sensor Networks Using Orthogonality Principle.
IEEE Commun. Lett., 2008

Comment - Practical Data Protection
CoRR, 2008

On the Security of "an efficient and complete remote user authentication scheme"
CoRR, 2008

A Flexible and Secure Remote Systems Authentication Scheme Using Smart Cards
CoRR, 2008

Securing Wireless Sensor Networks with Public Key Techniques.
Ad Hoc Sens. Wirel. Networks, 2008

EARS: Efficient Entity Authentication in Remote Systems.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Efficient user authentication and secure data transmission in wireless sensor networks.
Proceedings of the 16th International Conference on Networks, 2008

Revisiting Bluetooth Security (Short Paper).
Proceedings of the Information Systems Security, 4th International Conference, 2008

A Simple and Secure Authentication and Key Establishment Protocol.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

Secure and Efficient Authentication Scheme for Remote Systems.
Proceedings of the 2008 International Conference on Information Technology, 2008

2007
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings.
Int. J. Netw. Secur., 2007

Threshold key issuing in identity-based cryptosystems.
Comput. Stand. Interfaces, 2007

2006
Identity Based Multisignatures.
Informatica, 2006

Cryptanalysis of recently proposed Remote User Authentication Schemes.
IACR Cryptol. ePrint Arch., 2006

A novel remote user authentication scheme using bilinear pairings.
Comput. Secur., 2006

2005
Hierarchical key management scheme using polynomial interpolation.
ACM SIGOPS Oper. Syst. Rev., 2005

Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems
CoRR, 2005

An Effective Certificateless Signature Scheme Based on Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005

ID-based Serial Multisignature Scheme using Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005

Cryptanalysis and Improvement of a Multisignature Scheme.
Proceedings of the Distributed Computing, 2005

An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

MMPS: A Versatile Mobile-to-Mobile Payment System.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

SPAM: Secure Protocol for Authentication in Mobile-Communications.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

2004
A dynamic ID-based remote user authentication scheme.
IEEE Trans. Consumer Electron., 2004

An Efficient Proxy Signature Scheme with Revocation.
Informatica, 2004

A Novel Remote User Authentication Scheme Through Dynamic Login Identity.
Proceedings of the Distributed Computing, 2004

2003
Security Analysis of Lal and Awasthi's Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2003


  Loading...