A protocol for authentication with multiple levels of anonymity (AMLA) in VANETs NB Bhavesh, S Maity, RC Hansdah 2013 27th international conference on advanced information networking and …, 2013 | 34 | 2013 |
Mutual authentication for IoT smart environment using certificate-less public key cryptography DQ Bala, S Maity, SK Jena 2017 third international conference on sensing, signal processing and …, 2017 | 26 | 2017 |
A privacy preserving authentication protocol using quantum computing for V2I authentication in vehicular ad hoc networks K Prateek, F Altaf, R Amin, S Maity Security and Communication Networks 2022 (1), 4280617, 2022 | 25 | 2022 |
An unconditionally secured privacy-preserving authentication scheme for smart metering infrastructure in smart grid K Prateek, S Maity, R Amin IEEE Transactions on Network Science and Engineering 10 (2), 1085-1095, 2022 | 24 | 2022 |
Self-organized public key management in manets with enhanced security and without certificate-chains S Maity, RC Hansdah Computer networks 65, 183-211, 2014 | 22 | 2014 |
Quantum secured 6G technology-based applications in Internet of Everything K Prateek, NK Ojha, F Altaf, S Maity Telecommunication Systems 82 (2), 315-344, 2023 | 21 | 2023 |
PLHAS: Privacy-preserving localized hybrid authentication scheme for large scale vehicular ad hoc networks F Altaf, S Maity Vehicular Communications 30, 100347, 2021 | 18 | 2021 |
An efficient lightweight stream cipher algorithm for wireless networks S Maity, K Sinha, BP Sinha 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017 | 13 | 2017 |
Secure routing with an integrated localized key management protocol in MANETs SH Talawar, S Maity, RC Hansdah 2014 IEEE 28th International Conference on Advanced Information Networking …, 2014 | 12 | 2014 |
A brief survey of challenge–response authentication mechanisms P Kushwaha, H Sonkar, F Altaf, S Maity ICT Analysis and Applications: Proceedings of ICT4SD 2020, Volume 2, 573-581, 2021 | 11 | 2021 |
A lightweight remote user authentication protocol for smart e-health networking environment DQ Bala, S Maity, SK Jena 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017 | 11 | 2017 |
Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions V Vasani, K Prateek, R Amin, S Maity, AD Dwivedi Journal of Industrial Information Integration, 100594, 2024 | 10 | 2024 |
Post‐quantum blockchain–enabled services in scalable smart cities K Prateek, S Maity Quantum Blockchain: An Emerging Cryptographic Paradigm, 263-291, 2022 | 10 | 2022 |
Detecting malicious URLs using lexical analysis and network activities A Kumar, S Maity 2022 4th International Conference on Inventive Research in Computing …, 2022 | 8 | 2022 |
Certificate-less On-demand public key management (CLPKM) for self-organized MANETs S Maity, RC Hansdah International Conference on Information Systems Security, 277-293, 2012 | 8 | 2012 |
Membership models and the design of authentication protocols for MANETs S Maity, RC Hansdah 2012 26th International Conference on Advanced Information Networking and …, 2012 | 8 | 2012 |
An authentication protocol for vehicular ad hoc networks with heterogeneous anonymity requirements NB Bhavesh, S Maity, RC Hansdah International Journal of Space-Based and Situated Computing 27 4 (1), 1-14, 2014 | 7 | 2014 |
Certificateless aggregate message authentication for hierarchical trusted authority based vanet R Dewangan, F Altaf, S Maity 2019 3rd International Conference on Computing Methodologies and …, 2019 | 6 | 2019 |
Linearly homomorphic signature based secure computation outsourcing in vehicular adhoc networks F Altaf, S Maity 2019 Innovations in Power and Advanced Computing Technologies (i-PACT) 1, 1-7, 2019 | 6 | 2019 |
Applications of identity-based cryptography in smart home and healthcare: A recent review S Garg, S Nayak, AB Bavani Sankar, S Maity Cyber Security in Intelligent Computing and Communications, 227-241, 2022 | 5 | 2022 |