Manik Lal Das
Manik Lal Das
DA-IICT, India
Verified email at daiict.ac.in - Homepage
Title
Cited by
Cited by
Year
A dynamic ID-based remote user authentication scheme
ML Das, A Saxena, VP Gulati
IEEE transactions on Consumer Electronics 50 (2), 629-631, 2004
7142004
Two-factor user authentication in wireless sensor networks
ML Das
IEEE transactions on wireless communications 8 (3), 1086-1090, 2009
6192009
A novel remote user authentication scheme using bilinear pairings
ML Das, A Saxena, VP Gulati, DB Phatak
Computers & Security 25 (3), 184-189, 2006
1472006
Internet of Things—A paradigm shift of future Internet applications
S Agrawal, ML Das
2011 Nirma University International Conference on Engineering, 1-7, 2011
1322011
RFID security in the context of" internet of things"
R Aggarwal, ML Das
Proceedings of the First International Conference on Security of Internet of …, 2012
862012
An improved bilinear pairing based remote user authentication scheme
T Goriparthi, ML Das, A Saxena
Computer Standards & Interfaces 31 (1), 181-185, 2009
722009
Hierarchical key management scheme using polynomial interpolation
ML Das, A Saxena, VP Gulati, DB Phatak
ACM SIGOPS Operating Systems Review 39 (1), 40-47, 2005
592005
Cryptanalysis of recently proposed Remote User Authentication Schemes.
T Goriparthi, ML Das, A Negi, A Saxena
IACR Cryptol. ePrint Arch. 2006, 28, 2006
382006
On the security of SSL/TLS-enabled applications
ML Das, N Samdaria
Applied Computing and informatics 10 (1-2), 68-81, 2014
362014
Evaluation of a Suite of Metrics for Component Based Software Engineering (CBSE).
VL Narasimhan, PT Parthasarathy, M Das
Issues in Informing Science & Information Technology 6, 2009
362009
Threshold key issuing in identity-based cryptosystems
R Gangishetti, MC Gorantla, ML Das, A Saxena
Computer Standards & Interfaces 29 (2), 260-264, 2007
362007
An efficient secure key issuing protocol in ID-based cryptosystems
R Gangishetti, MC Gorantla, ML Das, A Saxena, VP Gulati
ITCC 2005, 674-678, 2005
362005
Privacy and security challenges in Internet of Things
ML Das
International Conference on Distributed Computing and Internet Technology, 33-48, 2015
312015
An efficient proxy signature scheme with revocation
ML Das, A Saxena, VP Gulati
Informatica 15 (4), 455-464, 2004
292004
MMPS: a versatile mobile-to-mobile payment system
A Saxena, ML Das, A Gupta
International Conference on Mobile Business (ICMB'05), 400-405, 2005
282005
A novel key update protocol in mobile sensor networks
S Agrawal, R Roman, ML Das, A Mathuria, J Lopez
International Conference on Information Systems Security, 194-207, 2012
272012
Algorithms and approaches of proxy signature: A survey
ML Das, A Saxena, DB Phatak
arXiv preprint cs/0612098, 2006
272006
Securing Wireless Sensor Networks with Public Key Techniques.
V Kumar, ML Das
Adhoc & Sensor Wireless Networks 5, 2008
252008
Proxy signature scheme with effective revocation using bilinear pairings
ML Das, A Saxena, DB Phatak
arXiv preprint arXiv:0712.3084, 2007
212007
An improved and efficient micro-payment scheme
PR Bayyapu, ML Das
Journal of theoretical and applied electronic commerce research 4 (1), 91-100, 2009
202009
The system can't perform the operation now. Try again later.
Articles 1–20