A protocol for authentication with multiple levels of anonymity (AMLA) in VANETs NB Bhavesh, S Maity, RC Hansdah 2013 27th International Conference on Advanced Information Networking and …, 2013 | 26 | 2013 |
Self-organized public key management in manets with enhanced security and without certificate-chains S Maity, RC Hansdah Computer networks 65, 183-211, 2014 | 20 | 2014 |
Mutual authentication for IoT smart environment using certificate-less public key cryptography DQ Bala, S Maity, SK Jena 2017 third international conference on sensing, signal processing and …, 2017 | 11 | 2017 |
Secure routing with an integrated localized key management protocol in MANETs SH Talawar, S Maity, RC Hansdah 2014 IEEE 28th International Conference on Advanced Information Networking …, 2014 | 8 | 2014 |
An authentication protocol for vehicular ad hoc networks with heterogeneous anonymity requirements NB Bhavesh, S Maity, RC Hansdah International Journal of Space-Based and Situated Computing 27 4 (1), 1-14, 2014 | 8 | 2014 |
Membership models and the design of authentication protocols for MANETs S Maity, RC Hansdah 2012 26th International Conference on Advanced Information Networking and …, 2012 | 8 | 2012 |
A lightweight remote user authentication protocol for smart E-health networking environment DQ Bala, S Maity, SK Jena 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017 | 7 | 2017 |
An efficient lightweight stream cipher algorithm for wireless networks S Maity, K Sinha, BP Sinha 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017 | 6 | 2017 |
A Secure and Efficient Authentication Protocol (SEAP) for MANETs wIth Membership Revocation S Maity, RC Hansdah 2013 27th International Conference on Advanced Information Networking and …, 2013 | 6 | 2013 |
Certificate-less On-demand public key management (CLPKM) for self-organized MANETs S Maity, RC Hansdah International Conference on Information Systems Security, 277-293, 2012 | 5 | 2012 |
Optimized CL-PKE with lightweight encryption for resource constrained devices MK Aditia, F Altaf, MR Singh, MS Burra, C Maurya, SS Sahoo, S Maity Proceedings of the 20th International Conference on Distributed Computing …, 2019 | 2 | 2019 |
A design and classification framework for routing protocols in MANETs N Kumar, RC Hansdah, S Maity International Journal of Wireless and Mobile Computing 12 (4), 364-383, 2017 | 2 | 2017 |
Certificate-less Public Key Encryption For Secure e-Healthcare Systems MK Aditia, S Paida, F Altaf, S Maity 2019 IEEE Conference on Information and Communication Technology, 1-5, 2019 | 1 | 2019 |
Privacy Preserving Lightweight Searchable Encryption for Cloud Assisted e-Health System F Altaf, M Aditia, E Saini, B Rakshit, S Maity 2019 International Conference on Wireless Communications Signal Processing …, 2019 | 1 | 2019 |
Detection of beacon transmission denial attack in ITS using temporal auto-correlation and random inspections S Sultana, F Altaf, MK Aditia, MS Burra, C Maurya, S Maity Proceedings of the 20th International Conference on Distributed Computing …, 2019 | 1 | 2019 |
Efficient destination discovery using geographical gossiping in manets N Kumar, S Maity, RC Hansdah | 1 | 2014 |
A multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks PJ Jambhulkar, S Maity, RC Hansdah International Symposium on Security in Computing and Communication, 138-149, 2013 | 1 | 2013 |
A Brief Survey of Challenge–Response Authentication Mechanisms P Kushwaha, H Sonkar, F Altaf, S Maity ICT Analysis and Applications, 573-581, 2021 | | 2021 |
Leakage Resilient Searchable Symmetric Encryption with Periodic Updation MS Burra, C Maurya, S Maity 2019 3rd International Conference on Trends in Electronics and Informatics …, 2019 | | 2019 |
Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET R Dewangan, F Altaf, S Maity 2019 3rd International Conference on Computing Methodologies and …, 2019 | | 2019 |