Sender-side public key deniable encryption scheme J Howlader, S Basu 2009 International Conference on Advances in Recent Technologies in …, 2009 | 25 | 2009 |
Uncoercibility in e-voting and eauctioning mechanisms using deniable encryption J Howlader, V Nair, S Basu, AK Mal International Journal of Network Security and Its Applications 3 (2), 97-109, 2011 | 17 | 2011 |
Secure receipt-free sealed-bid electronic auction J Howlader, A Ghosh, TDR Pal Contemporary Computing: Second International Conference, IC3 2009, Noida …, 2009 | 17 | 2009 |
Sealed‐bid auction: a cryptographic solution to bid‐rigging attack in the collusive environment J Howlader, AK Mal Security and Communication Networks 8 (18), 3415-3440, 2015 | 11 | 2015 |
Practical receipt-free sealed-bid auction in the coercive environment J Howlader, SK Roy, AK Mal Information Security and Cryptology--ICISC 2013: 16th International …, 2014 | 10 | 2014 |
Multiparty protocol that usually shuffles D Mardi, S Tanwar, J Howlader Security and Privacy 4 (6), e176, 2021 | 6 | 2021 |
Coercion resistant mix for electronic auction J Howlader, J Kar, AK Mal Information Systems Security: 8th International Conference, ICISS 2012 …, 2012 | 4 | 2012 |
An integrated routing and offset-time adaptation scheme for OBS network S Choudhury, V Nair, J Howlader, B Choudhury, AK Mal Proceedings of the 16th International Conference on Distributed Computing …, 2015 | 3 | 2015 |
Deniable encryption in replacement of untappable channel to prevent coercion J Howlader, V Nair, S Basu Advances in Networks and Communications: First International Conference on …, 2011 | 3 | 2011 |
Anonymous Bitcoin transaction: A solution using secure multiparty computation D Mardi, J Howlader Security and privacy 5 (4), e232, 2022 | 2 | 2022 |
A novel approach of data hiding in video using region selection and PCA S Roy, J Howlader, G Sanyal Multimedia Tools and Applications 81 (10), 14553-14571, 2022 | 2 | 2022 |
Monitoring and detection of NEFT fraudulent requests: A comparative analysis of machine learning models S Bhowmik, J Howlader 2024 15th International Conference on Computing Communication and Networking …, 2024 | 1 | 2024 |
A Lossless MOD-ENCODER Towards a Secure Communication GP Kumar, B Parajuli, AK Murmu, P Choudhury, J Howlader 2010 International Conference on Recent Trends in Information …, 2010 | 1 | 2010 |
Online payment fraud monitoring and detection: Performance analysis of tree-based Ensemble Machine Learning models S Bhowmik, J Howlader 2025 17th International Conference on COMmunication Systems and NETworks …, 2025 | | 2025 |
Some Notes on Deniability, Obfuscation, and Multiparty Computation S Sarkar, J Howlader International Conference on Network Security and Blockchain Technology, 207-223, 2024 | | 2024 |
Nonlinearity in AES Subkey Scheduling—An Augmented Security J Howlader International Conference on Network Security and Blockchain Technology, 165-179, 2024 | | 2024 |
Privacy Preserving Opinion Publishing System for Opinion Poll D Mardi, S Sarkar, J Howlader Proceedings of the 21st International Conference on Distributed Computing …, 2020 | | 2020 |
Multiparty Evaluation of Finite State D Mardi, J Howlader Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019 | | 2019 |
Multiparty Evaluation of Finite State Machine D Mardi, J Howlader Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019 | | 2019 |
An integrated routing and offset-time adaptation scheme for OBS network J Howlader, AK Mal, S Choudhury, V Nair, B Choudhury Proceedings of the 16th International Conference on Distributed Computing …, 2015 | | 2015 |