Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment B Bera, D Chattaraj, AK Das Computer Communications 153, 229-249, 2020 | 240 | 2020 |
Block-CLAP: Blockchain-assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation D Chattaraj, B Bera, AK Das, S Saha, P Lorenz, Y Park IEEE Transactions on Vehicular Technology 70 (8), 8092-8107, 2021 | 81 | 2021 |
A new two-server authentication and key agreement protocol for accessing secure cloud services D Chattaraj, M Sarma, AK Das Computer Networks 131, 144-164, 2018 | 47 | 2018 |
Consortium blockchain‐enabled access control mechanism in edge computing based generic Internet of Things environment S Saha, D Chattaraj, B Bera, A Kumar Das Transactions on Emerging Telecommunications Technologies 32 (6), e3995, 2021 | 36 | 2021 |
Designing fine-grained access control for software-defined networks using private blockchain D Chattaraj, B Bera, AK Das, JJPC Rodrigues, Y Park IEEE Internet of Things Journal 9 (2), 1542-1559, 2021 | 33 | 2021 |
On the design of blockchain-based access control scheme for software defined networks D Chattaraj, S Saha, B Bera, AK Das IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 27 | 2020 |
HEAP: an efficient and fault-tolerant authentication and key exchange protocol for Hadoop-assisted big data platform D Chattaraj, M Sarma, AK Das, N Kumar, JJPC Rodrigues, Y Park IEEE Access 6, 75342-75382, 2018 | 22 | 2018 |
Stochastic Petri Net based Modeling for Analysing Dependability of Big Data Storage System D Chattaraj, M Sarma, D Samanta 1st International Conference on Emerging Technologies in Data Mining and …, 2018 | 9 | 2018 |
Dependability quantification of cloud-centric authentication frameworks D Chattaraj, M Sarma 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 840-844, 2018 | 4 | 2018 |
AN EFFICIENT TWO - SERVER AUTHENTICATION AND KEY EXCHANGE PROTOCOL FOR ACCESSING SECURE CLOUD SERVICES D Chattaraj, M Sarma, D Samanta Jordanian Journal of Computers and Information Technology (JJCIT) 4 (1), 34-57, 2018 | 4 | 2018 |
An efficient two-server authentication and key exchange protocol D Chattaraj, M Sarma, D Samanta 2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017 | 2 | 2017 |
A Secure and Efficient Communication in VANET D Giri, D Chattaraj Information Technology Convergence and Services (ITCS), 2010 2nd …, 2010 | 2 | 2010 |
Storage Service Reliability and Availability Predictions of Hadoop Distributed File System D Chattaraj, S Bhagat, M Sarma Reliability, Safety and Hazard Assessment for Risk-Based Technologies …, 2020 | 1 | 2020 |
Privacy Preserving Two-Server Diffie-Hellman Key Exchange Protocol D Chattaraj, M Sarma, D Samanta 10th International Conference On Security Of Information And Networks, SIN …, 2017 | 1 | 2017 |
IDEA-PTLMS: Designing Secure Image Encoding and Decoding Algorithms using Pixel Transposition and Logistic Map based Substitutions PN Halvi, SN Prajwalasimha, D Chattaraj, N Kulkarni, D Karuppusamy 2024 Third International Conference on Electrical, Electronics, Information …, 2024 | | 2024 |
Security and Privacy Issues in 5G/6G‐Assisted Software‐Defined Networks D Chattaraj, AK Das In book: Software Defined Networks, 2022 | | 2022 |
Dependable and Secure Authentication Protocols Design for Accessing Cloud Services D Chattaraj IIT Kharagpur, 2020 | | 2020 |
EFFICIENT MULTI HOP ROUTING ALGORITHM FOR BLUETOOTH DEVICES DC G. Gupta, S. Gupta, M. Singh International Journal of Students' Research in Technology & Management 1 (2 …, 2015 | | 2015 |
Cloud-centric Authentication Systems: Dependable or Secure D CHATTARAJ, M SARMA | | |