关注
Arup Kumar Kumar Chattopadhyay
Arup Kumar Kumar Chattopadhyay
在 study.iitm.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
A secure framework for IoT-based healthcare system
AK Chattopadhyay, A Nag, D Ghosh, K Chanda
Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018 …, 2019
282019
A verifiable multi-secret image sharing scheme using XOR operation and hash function
AK Chattopadhyay, A Nag, JP Singh, AK Singh
Multimedia Tools and Applications 80, 35051-35080, 2021
252021
Secure data outsourcing on cloud using secret sharing scheme.
AK Chattopadhyay, A Nag, K Majumder
Int. J. Netw. Secur. 19 (6), 912-921, 2017
192017
Fuzzy-logic-based IoMT framework for COVID19 patient monitoring
S Panja, AK Chattopadhyay, A Nag, JP Singh
Computers & Industrial Engineering 176, 108941, 2023
182023
An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares
AK Chattopadhyay, A Nag, JP Singh
Multimedia Tools and Applications, 1-31, 2022
122022
A verifiable (n, n) secret image sharing scheme using XOR operations
AK Chattopadhyay, D Ghosh, P Maitra, A Nag, HN Saha
2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2018
122018
Secret sharing: A comprehensive survey, taxonomy and applications
AK Chattopadhyay, S Saha, A Nag, S Nandi
Computer Science Review 51, 100608, 2024
112024
Secret image sharing schemes: A comprehensive survey
S Saha, AK Chattopadhyay, AK Barman, A Nag, S Nandi
IEEE Access, 2023
52023
APDRChain: ANN based predictive analysis of diseases and report sharing through blockchain
S Bagchi, M Chakraborty, AK Chattopadhyay
Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019 …, 2020
52020
A novel approach of image steganography with encoding and location selection
D Ghosh, AK Chattopadhyay, A Nag
Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018 …, 2019
42019
A verifiable multi-secret sharing scheme with elliptic curve cryptography
AK Chattopadhyay, P Maitra, HN Saha, A Nag
2018 IEEE 9th Annual Information Technology, Electronics and Mobile …, 2018
42018
A nobel cryptosystem for group data sharing in cloud storage
R Banerjee, AK Chattopadhyay, A Nag, K Bose
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
32019
Single hop sensor deployment algorithm
AK Chattopadhyay, CK Bhattacharyya, S Bhattacharya
2012 Sixth International Conference on Sensing Technology (ICST), 347-352, 2012
32012
A Secure 'e-Tendering' Application Based on Secret Image Sharing
SKMAN Sanchita Saha, Arup Kumar Chattopadhyay
International Conference on Network Security and Blockchain Technology, 64-77, 2022
2*2022
Brain–Computer Interface-Based Fear Detection: A Self-defense Mechanism
R Chakraborty, AK Chattopadhyay, A Kairi, M Chakraborty
Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018 …, 2019
22019
A review of risks and threats on IoT layers
S Panja, AK Chattopadhyay, A Nag
Proceedings of International Conference on Computational Intelligence, Data …, 2021
12021
Microcontroller-Based Automotive Control System Employing Real-Time Health Monitoring of Drivers to Avoid Road Accidents
M Chakraborty, AK Chattopadhyay
Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019 …, 2020
12020
A Secure Steganography Scheme Using LFSR
D Ghosh, AK Chattopadhyay, K Chanda, A Nag
Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018 …, 2020
12020
An ideal multi-secret sharing scheme with verification
AK Chattopadhyay, A Nag, K Majumder
Sensors & Transducers 209 (2), 65, 2017
12017
Deployment of Sensors in Regular Terrain in Form of Interconnected WSN Units
AK Chattopadhyay, CK Bhattacharyya
Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th …, 2013
12013
系统目前无法执行此操作,请稍后再试。
文章 1–20