Theo dõi
Jaydeep Howlader
Jaydeep Howlader
Mục liên kết không xác định
Email được xác minh tại cse.nitdgp.ac.in
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Sender-side public key deniable encryption scheme
J Howlader, S Basu
2009 International Conference on Advances in Recent Technologies in …, 2009
252009
Uncoercibility in e-voting and eauctioning mechanisms using deniable encryption
J Howlader, V Nair, S Basu, AK Mal
International Journal of Network Security and Its Applications 3 (2), 97-109, 2011
172011
Secure receipt-free sealed-bid electronic auction
J Howlader, A Ghosh, TDR Pal
Contemporary Computing: Second International Conference, IC3 2009, Noida …, 2009
172009
Sealed‐bid auction: a cryptographic solution to bid‐rigging attack in the collusive environment
J Howlader, AK Mal
Security and Communication Networks 8 (18), 3415-3440, 2015
112015
Practical receipt-free sealed-bid auction in the coercive environment
J Howlader, SK Roy, AK Mal
Information Security and Cryptology--ICISC 2013: 16th International …, 2014
102014
Multiparty protocol that usually shuffles
D Mardi, S Tanwar, J Howlader
Security and Privacy 4 (6), e176, 2021
62021
Coercion resistant mix for electronic auction
J Howlader, J Kar, AK Mal
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
42012
An integrated routing and offset-time adaptation scheme for OBS network
S Choudhury, V Nair, J Howlader, B Choudhury, AK Mal
Proceedings of the 16th International Conference on Distributed Computing …, 2015
32015
Deniable encryption in replacement of untappable channel to prevent coercion
J Howlader, V Nair, S Basu
Advances in Networks and Communications: First International Conference on …, 2011
32011
Anonymous Bitcoin transaction: A solution using secure multiparty computation
D Mardi, J Howlader
Security and privacy 5 (4), e232, 2022
22022
A novel approach of data hiding in video using region selection and PCA
S Roy, J Howlader, G Sanyal
Multimedia Tools and Applications 81 (10), 14553-14571, 2022
22022
Monitoring and detection of NEFT fraudulent requests: A comparative analysis of machine learning models
S Bhowmik, J Howlader
2024 15th International Conference on Computing Communication and Networking …, 2024
12024
A Lossless MOD-ENCODER Towards a Secure Communication
GP Kumar, B Parajuli, AK Murmu, P Choudhury, J Howlader
2010 International Conference on Recent Trends in Information …, 2010
12010
Online payment fraud monitoring and detection: Performance analysis of tree-based Ensemble Machine Learning models
S Bhowmik, J Howlader
2025 17th International Conference on COMmunication Systems and NETworks …, 2025
2025
Some Notes on Deniability, Obfuscation, and Multiparty Computation
S Sarkar, J Howlader
International Conference on Network Security and Blockchain Technology, 207-223, 2024
2024
Nonlinearity in AES Subkey Scheduling—An Augmented Security
J Howlader
International Conference on Network Security and Blockchain Technology, 165-179, 2024
2024
Privacy Preserving Opinion Publishing System for Opinion Poll
D Mardi, S Sarkar, J Howlader
Proceedings of the 21st International Conference on Distributed Computing …, 2020
2020
Multiparty Evaluation of Finite State
D Mardi, J Howlader
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019
2019
Multiparty Evaluation of Finite State Machine
D Mardi, J Howlader
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019
2019
An integrated routing and offset-time adaptation scheme for OBS network
J Howlader, AK Mal, S Choudhury, V Nair, B Choudhury
Proceedings of the 16th International Conference on Distributed Computing …, 2015
2015
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20