Privacy preserving multi-party key exchange protocol for wireless mesh networks AK Roy, K Nath, G Srivastava, TR Gadekallu, JCW Lin Sensors 22 (5), 1958, 2022 | 18 | 2022 |
Privacy preservation with RTT‐based detection for wireless mesh networks AK Roy, AK Khan IET Information Security 14 (4), 391-400, 2020 | 10 | 2020 |
RTT based wormhole detection for wireless mesh networks AK Roy, AK Khan International Journal of Information Technology 12 (2), 539-546, 2020 | 8 | 2020 |
A new approach for gateway-level load balancing of wmns through k-means clustering B Das, AK Roy, AK Khan, S Roy 2014 International Conference on Computational Intelligence and …, 2014 | 8 | 2014 |
Gateway-level load balancing techniques for WMN: A comparative study B Das, AK Roy, AK Khan, S Roy 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 7 | 2014 |
Using genetic algorithm in inner product to resist modular exponentiation from higher order DPA attacks HJ Mahanta, K Nath, AK Roy, K Kotecha, V Varadaranjan IEEE Access 10, 3238-3251, 2021 | 5 | 2021 |
Architectural and security prospective of wireless mesh network AK Roy, AK Khan International Journal of Computational Intelligence & IoT 2 (1), 2019 | 5 | 2019 |
Efficient authentication and key management scheme for wireless mesh networks AK Roy, AK Khan International Journal of Internet Technology and Secured Transactions 9 (1-2 …, 2019 | 5 | 2019 |
Performance degradation in wireless mesh networks via external and internal attacks AK Roy, AK Khan 2019 2nd International Conference on Innovations in Electronics, Signal …, 2019 | 4 | 2019 |
Issues and challenges in building a model for intrusion detection system R Lalduhsaka, AK Khan, AK Roy 2021 5th International Conference on Information Systems and Computer …, 2021 | 3 | 2021 |
Handoff authentication through Diffie-Hellman approach for wireless mesh networks AK Roy, AK Khan Proceedings of the International Conference on Computing and Communication …, 2021 | 3 | 2021 |
Authentication protocol with privacy preservation for handover in wireless mesh networks AK Roy, AK Khan First International Conference on Sustainable Technologies for Computational …, 2020 | 2 | 2020 |
Prevention against internal attack via trust-based detection for wireless mesh networks AK Roy, AK Khan International Conference on Advanced Communication and Computational …, 2019 | 1 | 2019 |
Efficient handover authentication protocol with message integrity for mobile clients in wireless mesh networks AK Roy, V Varadaranjan, K Nath Journal of Information Security and Applications 84, 103806, 2024 | | 2024 |
Trust-Based Detection of Malicious Nodes for Wireless Mesh Networks AK Roy, AK Khan, HJ Mahanta International Conference on Machine Learning, Image Processing, Network …, 2020 | | 2020 |
EFFICIENT CLUSTERING APPROACH FOR LOAD BALANCING OFWMNS AK Roy | | |