Subhasish Dhal

Orcid: 0000-0002-3957-1789

According to our database1, Subhasish Dhal authored at least 17 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Relaying Vehicle Selection Protocol for a Road Intersection.
IEEE/ACM Trans. Netw., June, 2024

2023
Privacy Preserved Medical Service Provider Selection in Cloud-based Wireless Body Area Network.
Wirel. Pers. Commun., 2023

A Security and Privacy Preserved Intelligent Vehicle Navigation System.
IEEE Trans. Dependable Secur. Comput., 2023

Security Preserving Distributive n-Party Computation<sup>*</sup>.
Proceedings of the IEEE Region 10 Conference, 2023

2022
GDPR-Compliant Data Management Protocol: A Scalable Solution.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

2021
A secure road condition monitoring scheme in cloud based VANET.
Comput. Commun., 2021

An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
Automatic Privacy-Preserving Contact Tracing of Novel Coronavirus Infection by Cloud-Enabled WBAN using Blockchain.
IACR Cryptol. ePrint Arch., 2020

Deep Learning Based Approach For Malaria Detection in Blood Cell Images.
Proceedings of the 2020 IEEE Region 10 Conference, 2020

An Efficient Authentication Scheme for Secure Communication between Industrial IoT Devices.
Proceedings of the 11th International Conference on Computing, 2020

A Secure and Privacy-Preserved Road Condition Monitoring System.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

2019
An IoT Based Secure Object Tracking System.
Wirel. Pers. Commun., 2019

Detecting Code Smells using Deep Learning.
Proceedings of the TENCON 2019, 2019

2018
Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card.
Wirel. Pers. Commun., 2018

A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System.
Comput. Secur., 2018

Cryptanalysis and improvement of a cloud based login and authentication protocol.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

2017
A New Object Searching Protocol for Multi-tag RFID.
Wirel. Pers. Commun., 2017


  Loading...