Follow
Kumar Sekhar Roy
Kumar Sekhar Roy
Assistant Professor of CSE at MAHE Bangalore
Verified email at manipal.edu
Title
Cited by
Cited by
Year
A survey on post-quantum cryptography for constrained devices
KS Roy, HK Kalita
International Journal of Applied Engineering Research 14 (11), 2608-2615, 2019
352019
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
KS Roy, S Deb, HK Kalita
Digital Communications and Networks 10 (4), 989-1000, 2024
232024
A survey on authentication schemes in IoT
KS Roy, HK Kalita
2017 International Conference on Information Technology (ICIT), 202-207, 2017
152017
A Quantum Safe User Authentication Protocol for the Internet of Things
KS Roy, HK Kalita
International Journal of Next-Generation Computing, 178-192, 2019
92019
A Code based Light-weight Authentication Scheme for IoT in Fog Computing Environment
KSRHK Kalita
Journal of Advanced Research in Dynamical and Control Systems 11 (06 special …, 2019
3*2019
An authentication protocol for iot network based on cloud computing environment using two factor authentication
KS Roy, HK Kalita
22018
Analyzing CRYSTALS-Kyber's Susceptibility to Side Channel Attacks: An Empirical Exploration
KS Roy, SD SL, TK Mishra, M Hassan, RA Hazarika
12024
ECC and AES based secure authentication scheme for the Internet of Drones using FPGA
KS Roy, M Sujith, B Bhanu, P Preethi, RA Hazarika
12023
An User Authentication Scheme using McEliece Cryptosystem on Fog based IoT Network
KSR Hemanta Kumar Kalita
4th National Conference on Emerging Trends and Applications in Computer Science, 2018
12018
IoT Authentication Scheme using Niederreiter Cryptosystem in Fog Computing Environment
K Sekhar Roy, H Kumar Kalita
International Journal of Computational Intelligence & IoT 1 (2), 2018
12018
FPGA-based dual-layer authentication scheme utilizing AES and ECC for unmanned aerial vehicles
KS Roy, M Sujith, B Bhanu, Preethi, RA Hazarika
EURASIP Journal on Wireless Communications and Networking 2024 (1), 91, 2024
2024
A systematic survey on TPE schemes for the cloud: Classification, Challenges and Future Scopes
K Chowdhury, S Deb, KS Roy, D Podder, AK Sahu
IEEE Access, 2024
2024
Elliptic‐Curve Cryptography Implementation on RISC‐V Processors for Internet of Things Applications.
PP Srivathsa, MM Ulla, G Yadav, KS Roy, RA Hazarika, MN Khan
Journal of Engineering (2314-4912) 2024, 2024
2024
Applications & Case Studies of Successful Zero Trust
G HL, V Ravi, KS Roy
Securing the Future: Introduction to Zero Trust in Cybersecurity, 47-63, 2024
2024
Zero Trust Awareness: Creating a Culture Aware of Security
G HL, V Ravi, KS Roy
Securing the Future: Introduction to Zero Trust in Cybersecurity, 65-75, 2024
2024
Introduction to Zero Trust
G HL, V Ravi, KS Roy
Securing the Future: Introduction to Zero Trust in Cybersecurity, 11-22, 2024
2024
Compliance and Governance in Zero Trust
G HL, V Ravi, KS Roy
Securing the Future: Introduction to Zero Trust in Cybersecurity, 39-45, 2024
2024
Foundations of Cybersecurity
G HL, V Ravi, KS Roy
Securing the Future: Introduction to Zero Trust in Cybersecurity, 1-9, 2024
2024
Zero Trust for Cloud
G HL, V Ravi, KS Roy
Securing the Future: Introduction to Zero Trust in Cybersecurity, 31-38, 2024
2024
Implementing Zero Trust Networks
G HL, V Ravi, KS Roy
Securing the Future: Introduction to Zero Trust in Cybersecurity, 23-30, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20