A survey on post-quantum cryptography for constrained devices KS Roy, HK Kalita International Journal of Applied Engineering Research 14 (11), 2608-2615, 2019 | 28 | 2019 |
A survey on authentication schemes in IoT KS Roy, HK Kalita 2017 International Conference on Information Technology (ICIT), 202-207, 2017 | 13 | 2017 |
A Quantum Safe User Authentication Protocol for the Internet of Things KS Roy, HK Kalita International Journal of Next-Generation Computing, 178-192, 2019 | 6 | 2019 |
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks KS Roy, S Deb, HK Kalita Digital Communications and Networks, 2022 | 4 | 2022 |
A Code based Light-weight Authentication Scheme for IoT in Fog Computing Environment KSRHK Kalita Journal of Advanced Research in Dynamical and Control Systems 11 (06 special …, 2019 | 3* | 2019 |
An authentication protocol for iot network based on cloud computing environment using two factor authentication KS Roy, HK Kalita | 2 | 2018 |
ECC and AES based secure authentication scheme for the Internet of Drones using FPGA KS Roy, M Sujith, B Bhanu, P Preethi, RA Hazarika | 1 | 2023 |
An User Authentication Scheme using McEliece Cryptosystem on Fog based IoT Network KSR Hemanta Kumar Kalita 4th National Conference on Emerging Trends and Applications in Computer Science, 2018 | 1 | 2018 |
IoT Authentication Scheme using Niederreiter Cryptosystem in Fog Computing Environment K Sekhar Roy, H Kumar Kalita International Journal of Computational Intelligence & IoT 1 (2), 2018 | 1 | 2018 |
Analyzing CRYSTALS-Kyber's Susceptibility to Side Channel Attacks: An Empirical Exploration KS Roy, SD SL, TK Mishra, M Hassan, RA Hazarika | | 2024 |
An Exhaustive Study on Different Audio Watermarking Technique A. K. Maji, G. Sarma, S.C. Sahana, K.S. Roy International Conference on Computing and Communication Systems(I3CS-2015) 2 …, 2015 | | 2015 |
Design and development of a hybrid authentication protocol for the internet of things KS Roy Shillong, 0 | | |
A Novel Spread Spectrum based Audio Encryption Technique using Latin Square KS Roy, AK Maji, D Kandar | | |