A protocol for authentication with multiple levels of anonymity (AMLA) in VANETs NB Bhavesh, S Maity, RC Hansdah 2013 27th international conference on advanced information networking and …, 2013 | 33 | 2013 |
A privacy preserving authentication protocol using quantum computing for V2I authentication in vehicular ad hoc networks K Prateek, F Altaf, R Amin, S Maity Security and Communication Networks 2022 (1), 4280617, 2022 | 29 | 2022 |
An unconditionally secured privacy-preserving authentication scheme for smart metering infrastructure in smart grid K Prateek, S Maity, R Amin IEEE Transactions on Network Science and Engineering 10 (2), 1085-1095, 2022 | 28 | 2022 |
Mutual authentication for IoT smart environment using certificate-less public key cryptography DQ Bala, S Maity, SK Jena 2017 third international conference on sensing, signal processing and …, 2017 | 27 | 2017 |
Quantum secured 6G technology-based applications in Internet of Everything K Prateek, NK Ojha, F Altaf, S Maity Telecommunication Systems 82 (2), 315-344, 2023 | 26 | 2023 |
Self-organized public key management in manets with enhanced security and without certificate-chains S Maity, RC Hansdah Computer Networks 65, 183-211, 2014 | 21 | 2014 |
PLHAS: Privacy-preserving localized hybrid authentication scheme for large scale vehicular ad hoc networks F Altaf, S Maity Vehicular Communications 30, 100347, 2021 | 20 | 2021 |
Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions V Vasani, K Prateek, R Amin, S Maity, AD Dwivedi Journal of Industrial Information Integration, 100594, 2024 | 19 | 2024 |
A brief survey of challenge–response authentication mechanisms P Kushwaha, H Sonkar, F Altaf, S Maity ICT Analysis and Applications: Proceedings of ICT4SD 2020, Volume 2, 573-581, 2021 | 17 | 2021 |
Secure routing with an integrated localized key management protocol in MANETs SH Talawar, S Maity, RC Hansdah 2014 IEEE 28th International Conference on Advanced Information Networking …, 2014 | 12 | 2014 |
An efficient lightweight stream cipher algorithm for wireless networks S Maity, K Sinha, BP Sinha 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017 | 11 | 2017 |
A lightweight remote user authentication protocol for smart e-health networking environment DQ Bala, S Maity, SK Jena 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017 | 11 | 2017 |
Detecting malicious URLs using lexical analysis and network activities A Kumar, S Maity 2022 4th International Conference on Inventive Research in Computing …, 2022 | 10 | 2022 |
Post‐quantum blockchain–enabled services in scalable smart cities K Prateek, S Maity Quantum Blockchain: An Emerging Cryptographic Paradigm, 263-291, 2022 | 10 | 2022 |
Quantum programming on azure quantum—an open source tool for quantum developers K Prateek, S Maity Quantum Computing: A Shift from Bits to Qubits, 283-309, 2023 | 9 | 2023 |
Certificate-less On-demand public key management (CLPKM) for self-organized MANETs S Maity, RC Hansdah International Conference on Information Systems Security, 277-293, 2012 | 8 | 2012 |
Membership models and the design of authentication protocols for MANETs S Maity, RC Hansdah 2012 26th International Conference on Advanced Information Networking and …, 2012 | 8 | 2012 |
Certificateless Reliable and Privacy‐Preserving Auditing of Group Shared Data for FOG‐CPSs MS Burra, S Maity Security and Communication Networks 2022 (1), 6705948, 2022 | 7 | 2022 |
An authentication protocol for vehicular ad hoc networks with heterogeneous anonymity requirements NB Bhavesh, S Maity, RC Hansdah International Journal of Space-Based and Situated Computing 27 4 (1), 1-14, 2014 | 7 | 2014 |
Linearly homomorphic signature based secure computation outsourcing in vehicular adhoc networks F Altaf, S Maity 2019 Innovations in Power and Advanced Computing Technologies (i-PACT) 1, 1-7, 2019 | 6 | 2019 |