Image encryption using advanced hill cipher algorithm B Acharya, SK Panigrahy, SK Patra, G Panda International Journal of Recent Trends in Engineering 1 (1), 663-667, 2009 | 199 | 2009 |
Novel methods of generating self-invertible matrix for hill cipher algorithm B Acharya, GS Rath, SK Patra, SK Panigrahy | 134 | 2007 |
Image encryption using self-invertible key matrix of hill cipher algorithm SK Panigrahy, B Acharya, D Jena | 70 | 2008 |
Improved offline signature verification scheme using feature point extraction method D Jena, B Majhi, SK Panigrahy, SK Jena 2008 7th IEEE International Conference on Cognitive Informatics, 475-480, 2008 | 60 | 2008 |
A survey and tutorial on network optimization for intelligent transport system using the internet of vehicles SK Panigrahy, H Emany Sensors 23 (1), 555, 2023 | 45 | 2023 |
A secure and efficient message authentication protocol for VANETs with privacy preservation B Mishra, SK Panigrahy, TC Tripathy, D Jena, SK Jena 2011 World Congress on Information and Communication Technologies, 880-885, 2011 | 37 | 2011 |
Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison A Taparia, SK Panigrahy, SK Jena 2017 International conference on wireless communications, signal processing …, 2017 | 25 | 2017 |
Study and analysis of human stress detection using galvanic skin response (GSR) sensor in wired and wireless environments SK Panigrahy, SK Jena, AK Turuk Research Journal of Pharmacy and Technology 10 (2), 545-550, 2017 | 23 | 2017 |
Security in Bluetooth, RFID and wireless sensor networks SK Panigrahy, SK Jena, AK Turuk Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 23 | 2011 |
Man-in-the-middle attack and its countermeasure in bluetooth secure simple pairing TR Mutchukota, SK Panigrahy, SK Jena Computer Networks and Intelligent Computing: 5th International Conference on …, 2011 | 23 | 2011 |
HSX cryptosystem and its application to image encryption B Acharya, SK Shukla, SK Panigrahy, SK Patra, G Panda 2009 International Conference on Advances in Computing, Control, and …, 2009 | 16 | 2009 |
A secure RSU-aided aggregation and batch-verification scheme for vehicular networks S Mohanty, D Jena, SK Panigrahy Intemational Conference on Soft Computing and its Applications (ICSCA2012 …, 2012 | 14 | 2012 |
On the privacy protection of biometric traits: palmprint, face, and signature SK Panigrahy, D Jena, SB Korra, SK Jena Contemporary Computing: Second International Conference, IC3 2009, Noida …, 2009 | 14 | 2009 |
A novel and efficient cryptosystem for long message encryption D Jena, SK Panigrahy, SK Jena 2009 International Conference on Industrial and Information Systems (ICIIS), 7-9, 2009 | 13 | 2009 |
A Rotational-and Translational-Invariant Palmprint Recognition System SK Panigrahy, D Jena, SK Jena | 12 | 2008 |
An ANN based approach for wireless device fingerprinting K Kumar, AK Dalai, SK Panigrahy, SK Jena 2017 2nd IEEE International Conference on Recent Trends in Electronics …, 2017 | 9 | 2017 |
A novel approach for message authentication to prevent parameter tampering attack in web applications AK Dalai, SK Panigrahy, SK Jena Procedia engineering 38, 1495-1500, 2012 | 9 | 2012 |
A novel remote user authentication scheme using smart card based on ECDLP D Jena, SK Jena, D Mohanty, SK Panigrahy 2009 International Conference on Advanced Computer Control, 246-249, 2009 | 9 | 2009 |
Comparative study of ECG-based key agreement schemes in wireless body sensor networks S Kumar Panigrahy, B Prasad Dash, S Babu Korra, A Kumar Turuk, ... Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th …, 2019 | 6 | 2019 |
Web Usage Mining: An Implementation View SB Korra, SK Panigrahy, SK Jena Advances in Computing, Communication and Control: International Conference …, 2011 | 6 | 2011 |