Pinaki Sarkar

According to our database1, Pinaki Sarkar authored at least 23 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Authenticated key agreement for IoT network using HECC and CRT four co-primes.
Peer Peer Netw. Appl., July, 2024

2023
Strongly-resilient, well connected, non-interactive and gateway-free hierarchical deterministic key agreement schemes using Chinese remainder theorem.
J. Ambient Intell. Humaniz. Comput., 2023

2022
Connectivity invariant lightweight resiliency improvement strategies for CRT-subset scheme.
Ad Hoc Networks, 2022

2020
Bidirectional hash chains generically enhances resilience of key predistribution schemes.
IET Wirel. Sens. Syst., 2020

2019
A class of key-node indexed hash chains based key predistribution (KPS): Signed weighted graphs.
Comput. Networks, 2019

2018
CRT-KPS: A Key Predistribution Schemes Using CRT.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors.
Concurr. Comput. Pract. Exp., 2017

Sensornet - A Key Predistribution Scheme for Distributed Sensors using Nets.
Proceedings of the 6th International Conference on Sensor Networks (SENSORNETS 2017), 2017

Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS).
Proceedings of the Network and System Security - 11th International Conference, 2017

Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Secure IoT Using Weighted Signed Graphs.
Proceedings of the Security and Privacy in Communication Networks, 2016

Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi).
Proceedings of the Applications and Techniques in Information Security, 2016

2014
Securing Sensor Networks by Moderating Frequencies.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

Secure connected scalable combinatorial KPS in WSN: Deterministic merging, localization.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Code Based KPD Scheme with Full Connectivity: Deterministic Merging.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks.
Proceedings of the Information Security - 15th International Conference, 2012

Full Communication in Transversal Design Based Key Predistribution Schemes Using Deterministic Merging Block Strategy.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

2011
Highly Resilient Communication Using Affine Planes for Key Predistribution and Reed Muller Codes for Connectivity in Wireless Sensor Network.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

Key Predistribution Scheme Using Finite Fields and Reed Muller Codes.
Proceedings of the Software Engineering, 2011

2010
Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes.
IACR Cryptol. ePrint Arch., 2010

Secure connectivity model in Wireless Sensor Networks (WSN) using first order Reed-Muller codes.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010


  Loading...