Browsing by Subject Security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 18 of 18
Issue DateTitleAuthor(s)
Mar-2009Dynamic Approach for Web Services SelectionPandey, A; Jena, S K
2009An Efficient Secure Zone Based Routing Protocol for Mobile Adhoc NetworkPani, Niroj Kumar; Turuk, A K
Jul-2024Enhancing Malware Classification with Machine Learning: A Comparative Analysis of API Sequence-Based TechniquesRajneekant, .; Kishore, Pushkar; Gond, Bishwajit Prasad; Mohapatra, Durga Prasad
Jun-2023Hybrid cryptographic technique of data security for UAV applicationsMandal, Priti; Roy, Lakshi Prosad; Das, Santos Kumar
Jun-2015An Improved AES Hardware Trojan Benchmark to Validate Trojan Detection Schemes in an ASIC Design FlowKumar K, S; Chanamala, R; Sahoo, S R; Mahapatra, K K
Aug-2011Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple PairingMuchukota, T R; Panigrahy, S K; Jena, S K
Jan-2015On-Chip Comparison based Secure Output Response Compactor for Scan-based Attack ResistanceSudeendra, K K; Lodha, K; Sahoo, S R; Mahapatra, K K
Mar-2023PhD Forum 2022 – On-chain Off-chain Blockchain Model for IoT using IPFSKhobragade, Pooja; Turuk, Ashok Kumar
Jul-2024Poster: Defense against False Data Injection Attack in a Cyber Physical SystemPadhan, Sushree; Turuk, Ashok Kumar
Mar-2019Privacy Preservation and Authentication Protocol for BBU-Pool in C-RAN ArchitectureMahapatra, Byomakesh; Yadav, Awaneesh Kumar; Kumar, Shailesh; Turuk, Ashok Kumar
Mar-2018RFID Authentication Protocol for mobile readers satisfying EPC-C1-GEN2 standard of Passive TagsPriyanka, Y. J; Turuk, Ashok Kumar
2008A Rotational- and Translational-Invariant Palmprint Recognition SystemPanigrahy, S K; Jena, D; Jena, S K
2009Securing FSR against Data Packet Dropping by Malicious NodesSenapati, Sunil Kumar; Khilar, Pabitra Mohan
Mar-2018Security and Privacy Solution for I-RFID based Smart Infrastructure Health MonitoringKumar, Shailesh; Mahapatra, Byomakesh; Kumar, Rahul; Turuk, Ashok Kumar
Dec-2019Security Vulnerabilities in Applying Decentralized Ledger Systems for Obfuscating HardwaresMohanty, Jaganath Prasad; Mahapatra, Kamalakanta
Jun-2022SSG-AFL: Vulnerability detection for Reactive Systems using Static Seed Generator based AFLGodboley, Sangharatna; Dutta, Arpita; Krishna, P. Radha; Mohapatra, Durga Prasad
Jul-2024Strengthening Industrial IoT Security: Device Fingerprinting and ML-Based Node Authentication at GatewaySamal, Lopamudra; Mahapatra, KamalaKanta; Swain, Ayas Kanta
Jan-2020A Survey: Security Issues and Challenges in Internet of ThingsYedle, Balaji; Shrivastava, Gunjan; Kumar, Arun; Mishra, Alekha Kumar; Mishra, Tapas Kumar