Issue Date | Title | Author(s) |
Jul-2024 | Design of Lightweight Authentication Scheme For Low Power Internet of Medical Things(IoMT) | Poudel, Akash; Mohanty, Sujata; Pradhan, Manabhanjan |
Mar-2009 | Dynamic Approach for Web Services Selection | Pandey, A; Jena, S K |
2009 | An Efficient Secure Zone Based Routing Protocol for Mobile Adhoc Network | Pani, Niroj Kumar; Turuk, A K |
Jul-2024 | Enhancing Malware Classification with Machine Learning: A Comparative Analysis of API Sequence-Based Techniques | Rajneekant, .; Kishore, Pushkar; Gond, Bishwajit Prasad; Mohapatra, Durga Prasad |
Jun-2023 | Hybrid cryptographic technique of data security for UAV applications | Mandal, Priti; Roy, Lakshi Prosad; Das, Santos Kumar |
Jun-2015 | An Improved AES Hardware Trojan Benchmark to Validate Trojan Detection Schemes in an ASIC Design Flow | Kumar K, S; Chanamala, R; Sahoo, S R; Mahapatra, K K |
Aug-2011 | Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple Pairing | Muchukota, T R; Panigrahy, S K; Jena, S K |
Jan-2015 | On-Chip Comparison based Secure Output Response Compactor for Scan-based Attack Resistance | Sudeendra, K K; Lodha, K; Sahoo, S R; Mahapatra, K K |
Mar-2023 | PhD Forum 2022 – On-chain Off-chain Blockchain Model for IoT using IPFS | Khobragade, Pooja; Turuk, Ashok Kumar |
Jul-2024 | Poster: Defense against False Data Injection Attack in a Cyber Physical System | Padhan, Sushree; Turuk, Ashok Kumar |
Mar-2019 | Privacy Preservation and Authentication Protocol for BBU-Pool in C-RAN Architecture | Mahapatra, Byomakesh; Yadav, Awaneesh Kumar; Kumar, Shailesh; Turuk, Ashok Kumar |
Mar-2018 | RFID Authentication Protocol for mobile readers satisfying EPC-C1-GEN2 standard of Passive Tags | Priyanka, Y. J; Turuk, Ashok Kumar |
2008 | A Rotational- and Translational-Invariant Palmprint Recognition System | Panigrahy, S K; Jena, D; Jena, S K |
2009 | Securing FSR against Data Packet Dropping by Malicious Nodes | Senapati, Sunil Kumar; Khilar, Pabitra Mohan |
Mar-2018 | Security and Privacy Solution for I-RFID based Smart Infrastructure Health Monitoring | Kumar, Shailesh; Mahapatra, Byomakesh; Kumar, Rahul; Turuk, Ashok Kumar |
Dec-2019 | Security Vulnerabilities in Applying Decentralized Ledger Systems for Obfuscating Hardwares | Mohanty, Jaganath Prasad; Mahapatra, Kamalakanta |
Jun-2022 | SSG-AFL: Vulnerability detection for Reactive Systems using Static Seed Generator based AFL | Godboley, Sangharatna; Dutta, Arpita; Krishna, P. Radha; Mohapatra, Durga Prasad |
Jul-2024 | Strengthening Industrial IoT Security: Device Fingerprinting and ML-Based Node Authentication at Gateway | Samal, Lopamudra; Mahapatra, KamalaKanta; Swain, Ayas Kanta |
Jan-2020 | A Survey: Security Issues and Challenges in Internet of Things | Yedle, Balaji; Shrivastava, Gunjan; Kumar, Arun; Mishra, Alekha Kumar; Mishra, Tapas Kumar |