フォロー
Mohona Ghosh
Mohona Ghosh
Assistant Professor, Indira Gandhi Delhi Technical University for Women
確認したメール アドレス: igdtuw.ac.in
タイトル
引用先
引用先
Security analysis of SKINNY under related-tweakey settings
G Liu, M Ghosh, L Song
Cryptology ePrint Archive, 2016
842016
FbHash: A new similarity hashing scheme for digital forensics
D Chang, M Ghosh, SK Sanadhya, M Singh, DR White
Digital Investigation 29, S113-S123, 2019
322019
BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level
D Chang, S Garg, M Ghosh, M Hasan
Information Sciences 546, 481-511, 2021
302021
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Information Security and Cryptology-ICISC 2014: 17th International …, 2015
282015
The paper slip should be there! Perceptions of transaction receipts in branchless banking
S Panjwani, M Ghosh, P Kumaraguru, SV Singh
Proceedings of the 15th international conference on Human-computer …, 2013
232013
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms
D Chang, M Ghosh, KC Gupta, A Jati, A Kumar, D Moon, IG Ray, ...
Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017
112017
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256
Akshima, D Chang, M Ghosh, A Goel, SK Sanadhya
International Conference on Cryptology in India, 198-217, 2015
102015
A novel two-level secure access control approach for blockchain platform in healthcare
S Mittal, M Ghosh
International Journal of Information Security 22 (4), 799-817, 2023
92023
Analyzing the uncharted territory of monetizing scam Videos on YouTube
A Tripathi, M Ghosh, K Bharti
Social Network Analysis and Mining 12 (1), 119, 2022
82022
A study on characterizing the ecosystem of monetizing video spams on youtube platform
A Tripathi, KK Bharti, M Ghosh
Proceedings of the 21st International Conference on Information Integration …, 2019
82019
Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512
Akshima, D Chang, M Ghosh, A Goel, SK Sanadhya
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
82016
Leveraging LSTM and GAN for Modern Malware Detection
I Gupta, S Kumari, P Jha, M Ghosh
arXiv preprint arXiv:2405.04373, 2024
62024
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication
S Mittal, M Ghosh
The Journal of Supercomputing 80 (6), 7955-7992, 2024
62024
A fusion of binary grey wolf optimization algorithm with opposition and weighted positioning for feature selection
A Tripathi, KK Bharti, M Ghosh
International Journal of Information Technology 15 (8), 4469-4479, 2023
62023
A Lightweight Blockchain Framework for secure transaction in resource constrained IoT devices
R Raj, M Ghosh
2023 5th International Conference on Recent Advances in Information …, 2023
52023
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
D Chang, M Ghosh, A Jati, A Kumar, SK Sanadhya
Security, Privacy, and Applied Cryptography Engineering: 7th International …, 2017
52017
Bicliques with Minimal Data and Time Complexity for AES (extended version)
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Cryptology ePrint Archive, 2014
52014
Archaeozoological remains from West-Bengal, India
M Ghosh, KD Saha, V Saha, S Ray, B Talukdar
Kolkata: State fauna series 3, 349-381, 1992
51992
FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm
M Singh, A Khunteta, M Ghosh, D Chang, SK Sanadhya
Forensic Science International: Digital Investigation 41, 301375, 2022
42022
Cryptanalysis of Kalyna block cipher using impossible differential technique
S Kumar Gupta, M Ghosh, SK Mohanty
Proceedings of the Sixth International Conference on Mathematics and …, 2020
42020
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20