Browsing by Author Panigrahy, S K

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 11 to 24 of 24 < previous 
Issue DateTitleAuthor(s)
Dec-2009A Modified Remote User Authentication Scheme using Smart Card based on ECDLPJena, D; Panigrahy, S K; Jena, S K; Pani, S K
Dec-2009A Novel and Efficient Cryptosystem for Long Message EncryptionJena, D; Panigrahy, S K; Jena, S K
2008A Novel ECDLP-Based Blind Signature SchemeJena, D; Panigrahy, S K; Acharya, B; Jena, S K
2008A Novel ECDLP-Based Blind Signature Scheme with an IllustrationJena, D; Jena, S K; Majhi, B; Panigrahy, S K
2007Novel Methods of Generating Self-Invertible Matrix for Hill Cipher AlgorithmAcharya, B; Rath, G S; Patra, S K; Panigrahy, S K
29-Jul-2008A Novel Protocol for Smart Card Using ECDLPJena, D; Panigrahy, S K; Biswal, P K; Jena, S K
2008A novel protocol for smart card using ECDLPJena, D; Panigrahy, S K; Biswal, P K; Jena, S K
Jan-2009A Novel Remote User Authentication Scheme using Smart Card based on ECDLPJena, D; Jena, S K; Mohanty, D; Panigrahy, S K
19-Aug-2009On the Privacy Protection of Biometric Traits: Palmprint, Face, and SignaturePanigrahy, S K; Jena, D; Korra, S B; Jena, S K
2008A Rotational- and Translational-Invariant Palmprint Recognition SystemPanigrahy, S K; Jena, D; Jena, S K
Dec-2011A Secure and EfficientMessage Authentication Protocol for VANETs with Privacy PreservationMishra, B; Panigrahy, S K; Tripathy, T C; Jena, D; Jena, S K
Mar-2010A Secure e-Shopping Using Voice OrderingPanigrahy, S K; Jena, D; Jena, S K
Feb-2011Security in Bluetooth, RFID and Wireless Sensor NetworksPanigrahy, S K; Jena, S K; Turuk, A K
Jan-2011Web Usage Mining: An Implementation ViewKorra, S B; Panigrahy, S K; Jena, S K