Подписаться
Sandip Dutta
Sandip Dutta
Professor
Подтвержден адрес электронной почты в домене bitmesra.ac.in
Название
Процитировано
Процитировано
Год
A survey on implementation of lightweight block ciphers for resource constraints devices
Nayancy, S Dutta, S Chakraborty
Journal of Discrete Mathematical Sciences and Cryptography 25 (5), 1377-1398, 2022
342022
Regression test case prioritization technique using genetic algorithm
DK Yadav, S Dutta
Advances in Computational Intelligence: Proceedings of International …, 2017
272017
Network security using biometric and cryptography
S Dutta, A Kar, NC Mahanti, BN Chatterji
Advanced Concepts for Intelligent Vision Systems: 10th International …, 2008
272008
Test case prioritization technique based on early fault detection using fuzzy logic
DK Yadav, S Dutta
2016 3rd international conference on computing for sustainable global …, 2016
262016
A Symmetric Key Algorithm for Cryptography using Music
SC Sandip Dutta , Chandan Kumar
International Journal of Engineering and Technology (IJET) 5, 3109-3115, 2013
26*2013
A hybrid polybius-playfair music cipher
C Kumar, S Dutta, S Chakraborty
International Journal of Multimedia and Ubiquitous Engineering 10 (8), 187-198, 2015
222015
Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach
S Ray, KN Mishra, S Dutta
International Journal of Information Technology 14 (3), 1333-1341, 2022
212022
Regression test case selection and prioritization for object oriented software
DK Yadav, S Dutta
Microsystem Technologies 26 (5), 1463-1477, 2020
192020
Big data security issues from the perspective of IoT and cloud computing: A review
S Ray, KN Mishra, S Dutta
Recent Advances in Computer Science and Communications 12 (1), 1-22, 2020
182020
Hiding messages using musical notes: A fuzzy logic approach
C Kumar, S Dutta, S Chakraborty
International Journal of Security and Its Applications 9 (1), 237-248, 2015
172015
A Novel Method of Hiding Message Using Musical
S Dutta, S Chakraborty, NC Mahanti
International Journal of Computer Applications 975, 8887, 2010
132010
Empirical and statistical comparison of intermediate steps of AES-128 and RSA in terms of time consumption
P Pranav, S Dutta, S Chakraborty
Soft Computing 25 (21), 13127-13145, 2021
122021
Musical cryptography using genetic algorithm
C Kumar, S Dutta, S Chakborty
2014 International Conference on Circuits, Power and Computing Technologies …, 2014
122014
FQBDDA: fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment
A Kumar, S Dutta, P Pranav
International Journal of Information Technology 16 (2), 891-900, 2024
112024
Test case prioritization using clustering approach for object oriented software
DK Yadav, SK Dutta
International Journal of Information System Modeling and Design (IJISMD) 10 …, 2019
102019
Survey on lightweight cryptography algorithm for data privacy in internet of things
M Sinha, S Dutta
Proceedings of the Fourth International Conference on Microelectronics …, 2021
82021
A new cipher system using semi-natural composition in Indian raga
P Pranav, S Chakraborty, S Dutta
Soft Computing 24 (2), 1529-1537, 2020
82020
Analysis of SQL injection attacks in the cloud and in WEB applications
A Kumar, S Dutta, P Pranav
Security and Privacy 7 (3), e370, 2024
62024
Sensitive data identification and security assurance in cloud and IoT based networks
S Ray, KN Mishra, S Dutta
International Journal of Computer Network and Information Security 10 (5), 11, 2022
62022
Big data security issues from the perspective of IoT and cloud computing: a review
S Ray, KN Mishra, S Dutta
Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021
62021
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20