default search action
Sangram Ray
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Anindya Kumar Biswas, Mou Dasgupta, Sangram Ray:
Cryptanalysis and improvement of Q. Peng et al.'s PVSS scheme. Cryptologia 48(4): 291-304 (2024) - [j29]Dipanwita Sadhukhan, Sangram Ray, Mou Dasgupta, Muhammad Khurram Khan:
Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network. J. Netw. Comput. Appl. 224: 103831 (2024) - [j28]Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Mou Dasgupta, Ashok Kumar Das, Youngho Park:
ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment. IEEE Open J. Comput. Soc. 5: 329-342 (2024) - [j27]Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Mou Dasgupta, Ashok Kumar Das, Youngho Park:
ECC-EXONUM-eVOTING: A Novel Signature-Based e-Voting Scheme Using Blockchain and Zero Knowledge Property. IEEE Open J. Commun. Soc. 5: 583-598 (2024) - [j26]Dipanwita Sadhukhan, Sangram Ray, Mou Dasgupta, Joel J. P. C. Rodrigues:
CLAACS-IOD: Certificate-embedded lightweight authentication and access control scheme for Internet of Drones. Softw. Pract. Exp. 54(10): 1972-2006 (2024) - [j25]Kundan Kanti Saha, Sangram Ray, Mou Dasgupta:
ECMHP: ECC-Based Secure Handshake Protocol for Multicasting in CCN-IoT Environment. IEEE Trans. Netw. Serv. Manag. 21(5): 5826-5842 (2024) - 2023
- [j24]Uddalak Chatterjee, Sangram Ray, Sharmistha Adhikari, Muhammad Khurram Khan, Mou Dasgupta:
An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC. Comput. Commun. 209: 47-62 (2023) - [j23]Uddalak Chatterjee, Sangram Ray, Dipanwita Sadhukhan, Mou Dasgupta:
An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography. Innov. Syst. Softw. Eng. 19(3): 231-246 (2023) - [j22]Uddalak Chatterjee, Sangram Ray, Sharmistha Adhikari, Muhammad Khurram Khan, Mou Dasgupta:
Efficient and secure e-voting scheme using elliptic curve cryptography. Secur. Priv. 6(3) (2023) - [j21]Vivek Kumar, Sangram Ray, Dipanwita Sadhukhan, Jayashree Karmakar, Mou Dasgupta:
Enhanced pairing-free identity-based broadcast authentication protocol in WSN using ElGamal ECC. Secur. Priv. 6(3) (2023) - [j20]Sharmistha Adhikari, Sangram Ray, Mohammad S. Obaidat, G. P. Biswas:
ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet. Wirel. Pers. Commun. 132(1): 571-607 (2023) - [c9]Madhusmita Samal, Sangram Ray, Mou Dasgupta:
A Short Survey on Fog Computing and its Convergence with Internet of Things (IoT) Network. OCIT 2023: 132-137 - [c8]Indra Bahadur Chettri, Sangram Ray, Priyanka Das:
SAK-SAE: A Secure Authentication and Key-Exchange Scheme for Smart Agricultural Environment using Fuzzy Extractor. OCIT 2023: 867-873 - 2022
- [j19]Daya Sagar Gupta, Sangram Ray, Tajinder Singh, Madhu Kumari:
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security. Comput. Commun. 181: 69-79 (2022) - [j18]Uddalak Chatterjee, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta, Chien-Ming Chen:
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. Computing 104(6): 1359-1395 (2022) - [j17]Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Muhammad Khurram Khan, Mou Dasgupta:
ESOTP: ECC-based secure object tracking protocol for IoT communication. Int. J. Commun. Syst. 35(3) (2022) - [j16]Vivek Kumar, Sangram Ray:
Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm. Wirel. Pers. Commun. 123(3): 2341-2365 (2022) - 2021
- [j15]Diksha Rangwani, Dipanwita Sadhukhan, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta:
An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j14]K. Sowjanya, Mou Dasgupta, Sangram Ray:
Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things. J. Inf. Secur. Appl. 58: 102761 (2021) - [j13]Dipanwita Sadhukhan, Sangram Ray, Mohammad S. Obaidat, Mou Dasgupta:
A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography. J. Syst. Archit. 114: 101938 (2021) - [j12]K. Sowjanya, Mou Dasgupta, Sangram Ray:
A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems. J. Syst. Archit. 117: 102108 (2021) - [j11]Diksha Rangwani, Dipanwita Sadhukhan, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta:
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things. Peer-to-Peer Netw. Appl. 14(3): 1548-1571 (2021) - [j10]Dipanwita Sadhukhan, Sangram Ray, G. P. Biswas, Muhammad Khurram Khan, Mou Dasgupta:
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J. Supercomput. 77(2): 1114-1151 (2021) - [j9]Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Muhammad Khurram Khan, Mou Dasgupta:
ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things. Wirel. Pers. Commun. 116(3): 1867-1896 (2021) - [j8]Vivek Kumar, Sangram Ray, Mou Dasgupta, Muhammad Khurram Khan:
A Pairing Free Identity Based Two Party Authenticated Key Agreement Protocol Using Hexadecimal Extended ASCII Elliptic Curve Cryptography. Wirel. Pers. Commun. 118(4): 3045-3061 (2021) - [c7]Suman Majumder, Sangram Ray:
Usage of Blockchain Technology in e-Voting System Using Private Blockchain. FICTA (1) 2021: 51-61 - 2020
- [j7]Sharmistha Adhikari, Sangram Ray, Mohammad S. Obaidat, G. P. Biswas:
Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure. Comput. Commun. 157: 187-203 (2020) - [j6]K. Sowjanya, Mou Dasgupta, Sangram Ray:
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems. Int. J. Inf. Sec. 19(1): 129-146 (2020) - [j5]K. Sowjanya, Mou Dasgupta, Sangram Ray, Mohammad S. Obaidat:
An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things. IEEE Syst. J. 14(2): 2154-2163 (2020) - [c6]Suman Majumder, Sangram Ray, Chinmoy Ghosh, Shrayasi Datta:
Usage of Internet of Things in Home Automation Systems: A Review. CoMSO 2020: 57-72
2010 – 2019
- 2019
- [j4]Sharmistha Adhikari, Sangram Ray, Gosta Pada Biswas, Mohammad S. Obaidat:
Efficient and secure business model for content centric network using elliptic curve cryptography. Int. J. Commun. Syst. 32(1) (2019) - 2018
- [c5]Sharmistha Adhikari, Sangram Ray:
A Secure Anonymous Mobile Handover Authentication Protocol for Content Centric Network. CICBA (2) 2018: 360-373 - [c4]Debarpan Tribedi, Dipanwita Sadhukhan, Sangram Ray:
Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing. CICBA (2) 2018: 411-424 - [c3]Dipanwita Sadhukhan, Sangram Ray:
Cryptanalysis of an elliptic curve cryptography based lightweight authentication scheme for smart grid communication. RAIT 2018: 1-6 - 2016
- [j3]Sangram Ray, G. P. Biswas, Mou Dasgupta:
Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 90(3): 1331-1354 (2016) - 2014
- [j2]Sangram Ray, G. P. Biswas:
Design of an efficient mobile health system for achieving HIPAA privacy-security regulations. Int. J. Wirel. Mob. Comput. 7(4): 378-387 (2014) - [j1]Sangram Ray, G. P. Biswas:
A Certificate Authority (CA)-based cryptographic solution for HIPAA privacy/security regulations. J. King Saud Univ. Comput. Inf. Sci. 26(2): 170-180 (2014) - 2012
- [c2]Sangram Ray, G. P. Biswas:
An ECC based public key infrastructure usable for mobile applications. CCSEIT 2012: 562-568 - 2011
- [c1]Sangram Ray, G. P. Biswas:
Design of Mobile-PKI for using mobile phones in various applications. ReTIS 2011: 297-302
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint