Follow
Sanjeet Kumar Nayak
Title
Cited by
Cited by
Year
SEPDP: Secure and efficient privacy preserving provable data possession in cloud storage
SK Nayak, S Tripathy
IEEE Transactions on Services Computing 14 (3), 876-888, 2018
502018
IECA: an efficient IoT friendly image encryption technique using programmable cellular automata
S Roy, U Rawat, HA Sareen, SK Nayak
Journal of Ambient Intelligence and Humanized Computing 11, 5083-5102, 2020
402020
IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata
S Roy, M Shrivastava, CV Pandey, SK Nayak, U Rawat
Multimedia Tools and Applications 80, 31529-31567, 2021
372021
IESCA: An efficient image encryption scheme using 2-D cellular automata
S Roy, M Shrivastava, U Rawat, CV Pandey, SK Nayak
Journal of Information Security and Applications 61, 102919, 2021
262021
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage
SK Nayak, S Tripathy
International Journal of Information Security 19 (2), 229-240, 2020
212020
A Secure and Efficient Color Image Encryption Scheme based on Two Chaotic Systems and Advanced Encryption Standard
P Nayak, SK Nayak, S Das
2018 International Conference on Advances in Computing, Communications and …, 2018
132018
CLB-ECC: Certificateless Blind Signature Using ECC
SK Nayak, S Mohanty, B Majhi
Journal of Information Processing Systems 13 (4), 970-986, 2017
132017
Privacy preserving provable data possession for cloud based electronic health record system
SK Nayak, S Tripathy
2016 IEEE Trustcom/BigDataSE/ISPA, 860-867, 2016
132016
An ECDLP based untraceable blind signature scheme
SK Nayak, B Majhi, S Mohanty
2013 International Conference on Circuits, Power and Computing Technologies …, 2013
132013
On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks
R Shashidhara, SK Nayak, AK Das, Y Park
IEEE Access 9, 12879-12895, 2021
102021
SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys
SK Nayak, S Tripathy
IEEE Transactions on Emerging Topics in Computing 9 (1), 414-428, 2018
82018
SEPS: Efficient public-key based secure search over outsourced data
SK Nayak, S Tripathy
Journal of Information Security and Applications 61, 102932, 2021
52021
IETD: a novel image encryption technique using Tinkerbell map and Duffing map for IoT applications
TA Dhopavkar, SK Nayak, S Roy
Multimedia Tools and Applications 81 (30), 43189-43228, 2022
42022
SDNGuard: An Extension in Software Defined Network to Defend DoS Attack
JS Maddu, S Tripathy, SK Nayak
2019 IEEE Region 10 Symposium (TENSYMP), 44-49, 2019
42019
An Energy Efficient LoRa-based Multi-Sensor IoT Network for Smart Sensor Agriculture System
S Mishra, S Nayak, R Yadav
2023 IEEE Topical Conference on Wireless Sensors and Sensor Networks, 28-31, 2023
32023
SEMFS: Secure and efficient multi-keyword fuzzy search for cloud storage
SK Nayak, S Tripathy
Information Systems Security: 13th International Conference, ICISS 2017 …, 2017
32017
Blind Signature Schemes using Elliptic Curve Cryptography
SK Nayak
32013
Privacy preserving provable data possession for cloud based EHR system
SK Nayak, S Tripathy
IEEE, 2016
22016
Computation Infrastructure: Data Offloading, Processing, and Privacy
Y Koganti, R Yadav, SK Nayak, M Chaturvedi
Recent Advancements in ICT Infrastructure and Applications, 91-117, 2022
12022
BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications
RK Das, SK Nayak, SK Bhoi, SK Choudhury, B Majhi, S Mohanty
Computers 5 (4), 32, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20