Obserwuj
Bubu Bhuyan
Bubu Bhuyan
Associate Professor in Information Technology , North Eastern Hill University
Zweryfikowany adres z nehu.ac.in - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR
S Deb, B Bhuyan
Multimedia Tools and Applications 80, 19803-19826, 2021
532021
A novel approach towards realizing optimum data transfer and Automatic Variable Key (AVK) in cryptography
P Chakrabarti, B Bhuyan, A Chowdhuri, C Bhunia
IJCSNS 8 (5), 241, 2008
532008
Using game theory to model DoS attack and defence
B Kumar, B Bhuyan
Sādhanā 44 (12), 245, 2019
382019
Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field
S Deb, B Biswas, B Bhuyan
Multimedia Tools and Applications 78, 34901-34925, 2019
252019
Performance analysis of current lightweight stream ciphers for constrained environments
S Deb, B Bhuyan
Sādhanā 45, 1-12, 2020
232020
Game theoretical defense mechanism against reputation based sybil attacks
B Kumar, B Bhuyan
Procedia Computer Science 167, 2465-2477, 2020
162020
Study and scope of signcryption for cloud data access control
S Debnath, MVL Nunsanga, B Bhuyan
Advances in Computer, Communication and Control: Proceedings of ETES 2018 …, 2019
142019
Design and analysis of LFSR-based stream cipher
S Deb, B Bhuyan, NC Gupta
Proceedings of the International Conference on Computing and Communication …, 2018
112018
A new public key scheme based on integer factorization and discrete logarithm
P Goswami, MM Singh, B Bhuyan
Palestine Journal of Mathematics 6 (2), 580-584, 2017
112017
Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices
S Deb, B Bhuyan
ICT Express 4 (1), 19-23, 2018
102018
Application of. Automatic Variable Key (AVK) in RSA
P Chakrabarti, B Bhuyan, A Chowdhuri, CT Bhunia
International Journal HIT Transactions on ECCN 2 (5), 2007
102007
NMRMG: Nonlinear multiple-recursive matrix generator design approaches and its randomness analysis
S Deb, S Pal, B Bhuyan
Wireless Personal Communications 125 (1), 577-597, 2022
92022
A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance
SC Sahana, ML Das, B Bhuyan
Sādhanā 44, 1-9, 2019
92019
Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing
S Debnath, B Bhuyan
Multiagent and Grid Systems 15 (2), 99-119, 2019
72019
A new public key scheme based on DRSA and generalized GDLP
P Goswami, MM Singh, B Bhuyan
Discrete Mathematics, Algorithms and Applications 8 (04), 1650057, 2016
62016
Colour image encryption using an improved version of stream cipher and chaos
S Deb, B Bhuyan, N Kar, KS Reddy
International Journal of Ad Hoc and Ubiquitous Computing 41 (2), 118-133, 2022
52022
A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve.
SC Sahana, B Bhuyan
Int. J. Netw. Secur. 21 (1), 145-152, 2019
42019
Efficient and scalable outsourced data access control with user revocation in cloud: a comprehensive study
S Debnath, B Bhuyan
Multiagent and Grid Systems 14 (4), 383-401, 2018
42018
A new public key encryption scheme based on two cryptographic assumptions
P Goswami, MM Singh, B Bhuyan
Malaya Journal of Matematik 3 (04), 419-422, 2015
42015
A distributed fine-grained access control mechanism over cloud data outsourcing
S Debnath, SC Sahana, B Bhuyan
Science and Technology Journal 3 (II), 188-197, 2015
42015
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20