default search action
Pinaki Sarkar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Chandan Goswami, Avishek Adhikari, Suraj Kumar Sahoo, Pinaki Sarkar:
Authenticated key agreement for IoT network using HECC and CRT four co-primes. Peer Peer Netw. Appl. 17(4): 2397-2414 (2024) - 2023
- [j5]Pinaki Sarkar:
Strongly-resilient, well connected, non-interactive and gateway-free hierarchical deterministic key agreement schemes using Chinese remainder theorem. J. Ambient Intell. Humaniz. Comput. 14(5): 5817-5836 (2023) - 2022
- [j4]Pinaki Sarkar, Suraj Kumar Sahoo, Chandan Goswami, Avishek Adhikari:
Connectivity invariant lightweight resiliency improvement strategies for CRT-subset scheme. Ad Hoc Networks 129: 102803 (2022) - 2020
- [j3]Deepak Kumar Dalai, Pinaki Sarkar:
Bidirectional hash chains generically enhances resilience of key predistribution schemes. IET Wirel. Sens. Syst. 10(4): 154-165 (2020)
2010 – 2019
- 2019
- [j2]Pinaki Sarkar, Sukumar Nandi:
A class of key-node indexed hash chains based key predistribution (KPS): Signed weighted graphs. Comput. Networks 164 (2019) - 2018
- [c16]Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi:
CRT-KPS: A Key Predistribution Schemes Using CRT. ACISP 2018: 821-830 - 2017
- [j1]Pinaki Sarkar, Morshed Uddin Chowdhury, Kouichi Sakurai:
Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors. Concurr. Comput. Pract. Exp. 29(23) (2017) - [c15]Pinaki Sarkar:
Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS). NSS 2017: 315-331 - [c14]Deepak Kumar Dalai, Pinaki Sarkar:
Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet. NSS 2017: 683-693 - [c13]Deepak Kumar Dalai, Pinaki Sarkar:
Sensornet - A Key Predistribution Scheme for Distributed Sensors using Nets. SENSORNETS 2017: 49-58 - 2016
- [c12]Pinaki Sarkar, Morshed Uddin Chowdhury:
Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi). ATIS 2016: 106-114 - [c11]Deepak Kumar Dalai, Pinaki Sarkar:
Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks. Inscrypt 2016: 367-385 - [c10]Pinaki Sarkar, Morshed Uddin Chowdhury:
Secure IoT Using Weighted Signed Graphs. SecureComm 2016: 241-256 - 2014
- [c9]Pinaki Sarkar, Priyatosh Mahish, Morshed Uddin Chowdhury, Kouichi Sakurai:
Securing Sensor Networks by Moderating Frequencies. SecureComm (2) 2014: 173-185 - 2013
- [c8]Pinaki Sarkar, Aritra Dhar:
Code Based KPD Scheme with Full Connectivity: Deterministic Merging. ICT-EurAsia 2013: 141-151 - [c7]Pinaki Sarkar, Sarbajit Mukherjee:
Secure connected scalable combinatorial KPS in WSN: Deterministic merging, localization. LCN 2013: 622-629 - [c6]Pinaki Sarkar, Brijesh Kumar Rai, Aritra Dhar:
Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging. MobiHoc 2013: 301-304 - 2012
- [c5]Pinaki Sarkar:
Full Communication in Transversal Design Based Key Predistribution Schemes Using Deterministic Merging Block Strategy. ISPA 2012: 293-300 - [c4]Samiran Bag, Aritra Dhar, Pinaki Sarkar:
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks. ISC 2012: 136-150 - 2011
- [c3]Pinaki Sarkar, Morshed U. Chowdhury:
Key Predistribution Scheme Using Finite Fields and Reed Muller Codes. SNPD (Selected Papers) 2011: 67-79 - [c2]Samiran Bag, Amrita Saha, Pinaki Sarkar:
Highly Resilient Communication Using Affine Planes for Key Predistribution and Reed Muller Codes for Connectivity in Wireless Sensor Network. WiMo/CoNeCo 2011: 83-94 - 2010
- [c1]Pinaki Sarkar, Amrita Saha, Morshed U. Chowdhury:
Secure connectivity model in Wireless Sensor Networks (WSN) using first order Reed-Muller codes. MASS 2010: 507-512 - [i1]Pinaki Sarkar, Amrita Saha, Morshed U. Chowdhury:
Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes. IACR Cryptol. ePrint Arch. 2010: 356 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-25 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint