Sugata Sanyal
According to our database1,
Sugata Sanyal
authored at least 106 papers
between 2000 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2021
2020
Int. J. Intell. Syst. Technol. Appl., 2020
2017
A framework for phishing attack identification using rough set and formal concept analysis.
Int. J. Commun. Networks Distributed Syst., 2017
2015
Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs.
CoRR, 2015
Heuristic Algorithm using Internet of Things and Mobility for solving demographic issues in Financial Inclusion projects.
CoRR, 2015
CoRR, 2015
CoRR, 2015
2014
Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution.
CoRR, 2014
Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments.
CoRR, 2014
Application Layer Intrusion Detection with Combination of Explicit-Rule- Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program.
CoRR, 2014
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems.
CoRR, 2014
2013
CoRR, 2013
Appl. Math. Comput., 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
2012
Informatica (Slovenia), 2012
Int. J. Wirel. Mob. Comput., 2012
Performance analysis of deterministic key allocation schemes for wireless sensor networks.
Int. J. Wirel. Mob. Comput., 2012
Int. J. Wirel. Mob. Comput., 2012
A Heuristic Reputation Based System to Detect Spam activities in a Social Networking Platform, HRSSSNP
CoRR, 2012
A Connectionist Network Approach to Find Numerical Solutions of Diophantine Equations
CoRR, 2012
CoRR, 2012
Proactive TCP mechanism to improve Handover performance in Mobile Satellite and Terrestrial Networks
CoRR, 2012
A Hybrid Approach Towards Intrusion Detection Based on Artificial Immune System and Soft Computing
CoRR, 2012
CoRR, 2012
2011
A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices
CoRR, 2011
CoRR, 2011
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011
2010
Proceedings of the Emergent Web Intelligence: Advanced Information Retrieval, 2010
Piecemeal Journey to 'HALCYON' World of Computing: From Past Progress to Future Challenges.
Informatica (Slovenia), 2010
A Note on the Bounds for the Generalized Fibonacci-P-Sequence and its Application in Datahiding.
Int. J. Comput. Sci. Appl., 2010
Int. J. Bio Inspired Comput., 2010
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
CoRR, 2010
A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding
CoRR, 2010
CoRR, 2010
Piecemeal Journey To 'HALCYON' World Of Pervasive Computing : From past progress to future challenges
CoRR, 2010
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010
2009
Int. J. Comput. Sci. Appl., 2009
2008
Hiding Techniques Using Prime and Natural Numbers.
J. Digit. Inf. Manag., 2008
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008
2007
Impact of Node Mobility on MANET Routing Protocols Models.
J. Digit. Inf. Manag., 2007
Proceedings of the Parallel Processing and Applied Mathematics, 2007
Proceedings of the 6th International Symposium on Parallel and Distributed Computing (ISPDC 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Analysis of Dynamic Source Routing and Destination-Sequenced Distance-Vector Protocols for Different Mobility Models.
Proceedings of the First Asia International Conference on Modelling and Simulation, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
2005
J. Univers. Comput. Sci., 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
2004
J. Digit. Inf. Manag., 2004
Proceedings of the Distributed Computing, 2004
Proceedings of the Distributed Computing, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
2003
2002
The next generation Internet protocol.
Informatica (Slovenia), 2002
2000
Proceedings of the 13th International Conference on VLSI Design (VLSI Design 2000), 2000