DSpace@nitr >

Items for Author Panigrahy, S K in All of DSpace

Return to Browse by Author
Sort by Title Sorting by Date

Showing 24 items.

Date of IssueTitle Authors
2007 Novel Methods of Generating Self-Invertible Matrix for Hill Cipher AlgorithmAcharya, B; Rath, G S; Patra, S K; Panigrahy, S K
2008 A novel protocol for smart card using ECDLPJena, D; Panigrahy, S K; Biswal, P K; Jena, S K
2008 Image Encryption Using Self-Invertible Key Matrix of Hill Cipher AlgorithmPanigrahy, S K; Acharya, B; Jena, D
2008 A Novel ECDLP-Based Blind Signature SchemeJena, D; Panigrahy, S K; Acharya, B; Jena, S K
2008 An Efficient Palmimprint Image Recognition SystemPanigrahy, S K; Jena, D; Jena, S K
2008 A Novel ECDLP-Based Blind Signature Scheme with an IllustrationJena, D; Jena, S K; Majhi, B; Panigrahy, S K
2008 Improved Offline Signature Verification Scheme using Feature Point Extraction MethodJena, D; Majhi, B; Panigrahy, S K; Jena, S K
2008 Improved Offline Signature Verification Scheme using Feature Point Extraction MethodJena, D; Majhi, B; Panigrahy, S K; Jena, S K
2008 A Rotational- and Translational-Invariant Palmprint Recognition SystemPanigrahy, S K; Jena, D; Jena, S K
29-Jul-2008 A Novel Protocol for Smart Card Using ECDLPJena, D; Panigrahy, S K; Biswal, P K; Jena, S K
16-Aug-2008 Improved Offline Signature Verification Scheme Using Feature Point Extraction MethodJena, D; Majhi, B; Panigrahy, S K; Jena, S K
Jan-2009 A Novel Remote User Authentication Scheme using Smart Card based on ECDLPJena, D; Jena, S K; Mohanty, D; Panigrahy, S K
19-Aug-2009 On the Privacy Protection of Biometric Traits: Palmprint, Face, and SignaturePanigrahy, S K; Jena, D; Korra, S B; Jena, S K
Dec-2009 A Modified Remote User Authentication Scheme using Smart Card based on ECDLPJena, D; Panigrahy, S K; Jena, S K; Pani, S K
Dec-2009 H-S-X Cryptosystem and Its Application to Image EncryptionAchaya, B; Shukla, S K; Panigrahy, S K; Patra, S K; Panda, G
Dec-2009 A Novel and Efficient Cryptosystem for Long Message EncryptionJena, D; Panigrahy, S K; Jena, S K
Mar-2010 A Secure e-Shopping Using Voice OrderingPanigrahy, S K; Jena, D; Jena, S K
2011 Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple PairingMutchukota, T R; Panigrahy, S K; Jena, S K
Jan-2011 Anomaly Detection in Ethernet Networks Using Self Organizing MapsPanigrahy, S K; Mahapatra, J R; Mohanty, J; Jena, S K
Jan-2011 Web Usage Mining: An Implementation ViewKorra, S B; Panigrahy, S K; Jena, S K
Feb-2011 Security in Bluetooth, RFID and Wireless Sensor NetworksPanigrahy, S K; Jena, S K; Turuk, A K
Aug-2011 Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple PairingMuchukota, T R; Panigrahy, S K; Jena, S K
Dec-2011 A Secure and EfficientMessage Authentication Protocol for VANETs with Privacy PreservationMishra, B; Panigrahy, S K; Tripathy, T C; Jena, D; Jena, S K
Dec-2011 An Approach to Data Integrity in Web ApplicationsDalai, A K; Panigrahy, S K; Jena, S K

 

Powered by DSpace Feedback