A secure framework for IoT-based healthcare system AK Chattopadhyay, A Nag, D Ghosh, K Chanda Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018 …, 2019 | 28 | 2019 |
A verifiable multi-secret image sharing scheme using XOR operation and hash function AK Chattopadhyay, A Nag, JP Singh, AK Singh Multimedia Tools and Applications 80, 35051-35080, 2021 | 25 | 2021 |
Secure data outsourcing on cloud using secret sharing scheme. AK Chattopadhyay, A Nag, K Majumder Int. J. Netw. Secur. 19 (6), 912-921, 2017 | 19 | 2017 |
Fuzzy-logic-based IoMT framework for COVID19 patient monitoring S Panja, AK Chattopadhyay, A Nag, JP Singh Computers & Industrial Engineering 176, 108941, 2023 | 18 | 2023 |
An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares AK Chattopadhyay, A Nag, JP Singh Multimedia Tools and Applications, 1-31, 2022 | 12 | 2022 |
A verifiable (n, n) secret image sharing scheme using XOR operations AK Chattopadhyay, D Ghosh, P Maitra, A Nag, HN Saha 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2018 | 12 | 2018 |
Secret sharing: A comprehensive survey, taxonomy and applications AK Chattopadhyay, S Saha, A Nag, S Nandi Computer Science Review 51, 100608, 2024 | 11 | 2024 |
Secret image sharing schemes: A comprehensive survey S Saha, AK Chattopadhyay, AK Barman, A Nag, S Nandi IEEE Access, 2023 | 5 | 2023 |
APDRChain: ANN based predictive analysis of diseases and report sharing through blockchain S Bagchi, M Chakraborty, AK Chattopadhyay Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019 …, 2020 | 5 | 2020 |
A novel approach of image steganography with encoding and location selection D Ghosh, AK Chattopadhyay, A Nag Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018 …, 2019 | 4 | 2019 |
A verifiable multi-secret sharing scheme with elliptic curve cryptography AK Chattopadhyay, P Maitra, HN Saha, A Nag 2018 IEEE 9th Annual Information Technology, Electronics and Mobile …, 2018 | 4 | 2018 |
A nobel cryptosystem for group data sharing in cloud storage R Banerjee, AK Chattopadhyay, A Nag, K Bose 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 3 | 2019 |
Single hop sensor deployment algorithm AK Chattopadhyay, CK Bhattacharyya, S Bhattacharya 2012 Sixth International Conference on Sensing Technology (ICST), 347-352, 2012 | 3 | 2012 |
A Secure 'e-Tendering' Application Based on Secret Image Sharing SKMAN Sanchita Saha, Arup Kumar Chattopadhyay International Conference on Network Security and Blockchain Technology, 64-77, 2022 | 2* | 2022 |
Brain–Computer Interface-Based Fear Detection: A Self-defense Mechanism R Chakraborty, AK Chattopadhyay, A Kairi, M Chakraborty Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018 …, 2019 | 2 | 2019 |
A review of risks and threats on IoT layers S Panja, AK Chattopadhyay, A Nag Proceedings of International Conference on Computational Intelligence, Data …, 2021 | 1 | 2021 |
Microcontroller-Based Automotive Control System Employing Real-Time Health Monitoring of Drivers to Avoid Road Accidents M Chakraborty, AK Chattopadhyay Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019 …, 2020 | 1 | 2020 |
A Secure Steganography Scheme Using LFSR D Ghosh, AK Chattopadhyay, K Chanda, A Nag Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018 …, 2020 | 1 | 2020 |
An ideal multi-secret sharing scheme with verification AK Chattopadhyay, A Nag, K Majumder Sensors & Transducers 209 (2), 65, 2017 | 1 | 2017 |
Deployment of Sensors in Regular Terrain in Form of Interconnected WSN Units AK Chattopadhyay, CK Bhattacharyya Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th …, 2013 | 1 | 2013 |