Sangram Ray
Orcid: 0000-0002-1920-4172
According to our database1,
Sangram Ray
authored at least 39 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Netw. Serv. Manag., October, 2024
Cryptologia, July, 2024
CLAACS-IOD: Certificate-embedded lightweight authentication and access control scheme for Internet of Drones.
Softw. Pract. Exp., 2024
ECC-EXONUM-eVOTING: A Novel Signature-Based e-Voting Scheme Using Blockchain and Zero Knowledge Property.
IEEE Open J. Commun. Soc., 2024
ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment.
IEEE Open J. Comput. Soc., 2024
Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network.
J. Netw. Comput. Appl., 2024
2023
ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet.
Wirel. Pers. Commun., September, 2023
An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography.
Innov. Syst. Softw. Eng., September, 2023
An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC.
Comput. Commun., September, 2023
Enhanced pairing-free identity-based broadcast authentication protocol in WSN using ElGamal ECC.
Secur. Priv., 2023
Secur. Priv., 2023
A Short Survey on Fog Computing and its Convergence with Internet of Things (IoT) Network.
Proceedings of the OITS International Conference on Information Technology, 2023
SAK-SAE: A Secure Authentication and Key-Exchange Scheme for Smart Agricultural Environment using Fuzzy Extractor.
Proceedings of the OITS International Conference on Information Technology, 2023
2022
Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm.
Wirel. Pers. Commun., 2022
Int. J. Commun. Syst., 2022
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing.
Computing, 2022
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security.
Comput. Commun., 2022
2021
ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things.
Wirel. Pers. Commun., 2021
A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2021
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography.
J. Supercomput., 2021
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things.
Peer-to-Peer Netw. Appl., 2021
A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems.
J. Syst. Archit., 2021
A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography.
J. Syst. Archit., 2021
Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things.
J. Inf. Secur. Appl., 2021
An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network.
Trans. Emerg. Telecommun. Technol., 2021
Proceedings of the Intelligent Data Engineering and Analytics, 2021
2020
An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things.
IEEE Syst. J., 2020
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems.
Int. J. Inf. Sec., 2020
Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure.
Comput. Commun., 2020
Proceedings of the Modeling, Simulation and Optimization, 2020
2019
Efficient and secure business model for content centric network using elliptic curve cryptography.
Int. J. Commun. Syst., 2019
2018
Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018
Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018
A Secure Anonymous Mobile Handover Authentication Protocol for Content Centric Network.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018
2016
Wirel. Pers. Commun., 2016
2014
A Certificate Authority (CA)-based cryptographic solution for HIPAA privacy/security regulations.
J. King Saud Univ. Comput. Inf. Sci., 2014
Design of an efficient mobile health system for achieving HIPAA privacy-security regulations.
Int. J. Wirel. Mob. Comput., 2014
2012
Proceedings of the Second International Conference on Computational Science, 2012
2011
Proceedings of the International Conference on Recent Trends in Information Systems, 2011