Swarm intelligence algorithms for data clustering A Abraham, S Das, S Roy Soft computing for knowledge discovery and data mining, 279-313, 2008 | 240 | 2008 |
Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things S Roy, S Chatterjee, AK Das, S Chattopadhyay, S Kumari, M Jo IEEE Internet of Things Journal 5 (4), 2884-2895, 2017 | 213 | 2017 |
Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment S Chatterjee, S Roy, AK Das, S Chattopadhyay, N Kumar, AV Vasilakos IEEE Transactions on Dependable and Secure Computing 15 (5), 824-839, 2016 | 213 | 2016 |
Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications S Roy, AK Das, S Chatterjee, N Kumar, S Chattopadhyay, ... IEEE Transactions on Industrial Informatics 15 (1), 457-468, 2018 | 186 | 2018 |
On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services S Roy, S Chatterjee, AK Das, S Chattopadhyay, N Kumar, AV Vasilakos IEEE Access 5, 25808-25825, 2017 | 133 | 2017 |
Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment S Banerjee, S Roy, V Odelu, AK Das, S Chattopadhyay, JJPC Rodrigues, ... Journal of Information Security and Applications 53, 102503, 2020 | 57 | 2020 |
On the design of fine grained access control with user authentication scheme for telecare medicine information systems S Chatterjee, S Roy, AK Das, S Chattopadhyay, N Kumar, AG Reddy, ... IEEE access 5, 7012-7030, 2017 | 47 | 2017 |
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system M Wazid, AK Das, R Hussain, N Kumar, S Roy Journal of Systems Architecture 123, 102370, 2022 | 27 | 2022 |
An efficient biometric based remote user authentication scheme for secure internet of things environment S Roy, S Chatterjee, G Mahapatra Journal of Intelligent & Fuzzy Systems 34 (3), 1403-1410, 2018 | 16 | 2018 |
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges M Bhattacharya, S Roy, S Chattopadhyay, AK Das, S Shetty Security and Privacy 6 (1), e275, 2023 | 12 | 2023 |
Blockchain-based lightweight authentication protocol for IoT-enabled smart agriculture A Vangala, S Roy, AK Das 2022 International Conference on Cyber-Physical Social Intelligence (ICCSI …, 2022 | 11 | 2022 |
An efficient dynamic access control scheme for distributed wireless sensor networks S Chatterjee, S Roy International Journal of Ad Hoc and Ubiquitous Computing 27 (1), 1-18, 2018 | 11 | 2018 |
Cryptanalysis and enhancement of a distributed fine-grained access control in wireless sensor networks S Chatterjee, S Roy 2014 International Conference on Advances in Computing, Communications and …, 2014 | 11 | 2014 |
ASPA-MOSN: An efficient user authentication scheme for phishing attack detection in mobile online social networks M Bhattacharya, S Roy, S Chattopadhyay, AK Das, SS Jamal IEEE Systems Journal 17 (1), 234-245, 2022 | 9 | 2022 |
A privacy-preserving efficient location-sharing scheme for mobile online social network applications M Bhattacharya, S Roy, K Mistry, HPH Shum, S Chattopadhyay IEEE Access 8, 221330-221351, 2020 | 8 | 2020 |
Securing age-of-information (AoI)-enabled 5G smart warehouse using access control scheme AK Das, S Roy, E Bandara, S Shetty IEEE Internet of Things Journal 10 (2), 1358-1375, 2022 | 7 | 2022 |
Blockchain-Based Efficient Access Control with Handover Policy in IoV-Enabled Intelligent Transportation System S Roy, S Nandi, R Maheshwari, S Shetty, AK Das, P Lorenz IEEE Transactions on Vehicular Technology, 2023 | 6 | 2023 |
A biometrics-based robust and secure user authentication protocol for e-healthcare service S Roy, S Chatterjee, S Chattopadhyay, AK Gupta 2016 International Conference on Advances in Computing, Communications and …, 2016 | 6 | 2016 |
ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications AK Mishra, M Wazid, DP Singh, AK Das, S Roy, S Shetty IEEE Transactions on Network Science and Engineering, 2023 | 5 | 2023 |
DDoS attack resisting authentication protocol for mobile based online social network applications M Bhattacharya, S Roy, AK Das, S Chattopadhyay, S Banerjee, A Mitra Journal of Information Security and Applications 65, 103115, 2022 | 5 | 2022 |