default search action
G. P. Biswas
Person information
- affiliation: Indian School of Mines, Dhanbad, India
- affiliation: Indian Institute of Technology, Kharagpur, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j60]Sharmistha Adhikari, Sangram Ray, Mohammad S. Obaidat, G. P. Biswas:
ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet. Wirel. Pers. Commun. 132(1): 571-607 (2023) - 2021
- [j59]Tanusree Kaibartta, G. P. Biswas, Arup Kumar Pal, Debesh Kumar Das:
A Genetic Algorithm-Based Metaheuristic Approach for Test Cost Optimization of 3D SIC. IEEE Access 9: 160987-161002 (2021) - [j58]Arijit Karati, Ruhul Amin, Prerna Mohit, Venkatasamy Sureshkumar, G. P. Biswas:
Design of a secure file storage and access protocol for cloud-enabled Internet of Things environment. Comput. Electr. Eng. 94: 107298 (2021) - [j57]Prerna Mohit, Ruhul Amin, G. P. Biswas:
An e-healthcare authentication protocol employing cloud computing. Int. J. Ad Hoc Ubiquitous Comput. 36(3): 155-168 (2021) - [j56]Dipanwita Sadhukhan, Sangram Ray, G. P. Biswas, Muhammad Khurram Khan, Mou Dasgupta:
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J. Supercomput. 77(2): 1114-1151 (2021) - 2020
- [j55]Sharmistha Adhikari, Sangram Ray, Mohammad S. Obaidat, G. P. Biswas:
Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure. Comput. Commun. 157: 187-203 (2020) - [j54]Tanusree Kaibartta, G. P. Biswas, Debesh Kumar Das:
Co-Optimization of Test Wrapper Length and TSV for TSV Based 3D SOCs. J. Electron. Test. 36(2): 239-253 (2020) - [c35]Tanusree Kaibartta, G. P. Biswas, Debesh K. Das:
Heuristic Approach for Identification of Random TSV Defects in 3D IC During Pre-bond Testing. ATS 2020: 1-6
2010 – 2019
- 2019
- [j53]Sankar Mukherjee, Daya Sagar Gupta, G. P. Biswas:
An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice. Computing 101(12): 1763-1788 (2019) - [j52]Arijit Karati, G. P. Biswas:
Provably secure and authenticated data sharing protocol for IoT-based crowdsensing network. Trans. Emerg. Telecommun. Technol. 30(4) (2019) - [j51]Sharmistha Adhikari, Sangram Ray, Gosta Pada Biswas, Mohammad S. Obaidat:
Efficient and secure business model for content centric network using elliptic curve cryptography. Int. J. Commun. Syst. 32(1) (2019) - [j50]Sankar Mukherjee, Ruhul Amin, G. P. Biswas:
Design of routing protocol for multi-sink based wireless sensor networks. Wirel. Networks 25(7): 4331-4347 (2019) - 2018
- [j49]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Mohammad S. Obaidat:
A robust mutual authentication protocol for WSN with multiple base-stations. Ad Hoc Networks 75-76: 1-18 (2018) - [j48]Daya Sagar Gupta, G. P. Biswas:
Design of lattice-based ElGamal encryption and signature schemes using SIS problem. Trans. Emerg. Telecommun. Technol. 29(6) (2018) - [j47]Ruhul Amin, Neeraj Kumar, G. P. Biswas, Rahat Iqbal, Victor I. Chang:
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Future Gener. Comput. Syst. 78: 1005-1019 (2018) - [j46]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar:
A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener. Comput. Syst. 80: 483-495 (2018) - [j45]Daya Sagar Gupta, G. P. Biswas:
A novel and efficient lattice-based authenticated key exchange protocol in C-K model. Int. J. Commun. Syst. 31(3) (2018) - [j44]Arijit Karati, SK Hafizul Islam, G. P. Biswas, Md. Zakirul Alam Bhuiyan, Pandi Vijayakumar, Marimuthu Karuppiah:
Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments. IEEE Internet Things J. 5(4): 2904-2914 (2018) - [j43]Arijit Karati, SK Hafizul Islam, G. P. Biswas:
A pairing-free and provably secure certificateless signature scheme. Inf. Sci. 450: 378-391 (2018) - [j42]Sankar Mukherjee, G. P. Biswas:
Location estimation based routing for mobile adhoc network. J. Intell. Fuzzy Syst. 35(2): 1209-1224 (2018) - [c34]Shalini Banerjee, Daya Sagar Gupta, G. P. Biswas:
Hierarchy-based cheating detection and cheater identification in secret sharing schemes. RAIT 2018: 1-6 - [c33]Daya Sagar Gupta, G. P. Biswas, Roushan Nandan:
Security weakness of a lattice-based key exchange protocol. RAIT 2018: 1-5 - 2017
- [j41]Prerna Mohit, G. P. Biswas:
Modification of Traditional RSA into Symmetric-RSA Cryptosystems. Int. J. Bus. Data Commun. Netw. 13(1): 66-73 (2017) - [j40]SK Hafizul Islam, Mohammad Sabzinejad Farash, G. P. Biswas, Muhammad Khurram Khan, Mohammad S. Obaidat:
A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography. Int. J. Comput. Math. 94(1): 39-55 (2017) - [j39]Ruhul Amin, SK Hafizul Islam, Mohammad S. Obaidat, G. P. Biswas, Kuei-Fang Hsiao:
An anonymous and robust multi-server authentication protocol using multiple registration servers. Int. J. Commun. Syst. 30(18) (2017) - [j38]Daya Sagar Gupta, G. P. Biswas:
An ECC-based authenticated group key exchange protocol in IBE framework. Int. J. Commun. Syst. 30(18) (2017) - [j37]Daya Sagar Gupta, G. P. Biswas:
A Secure Cloud Storage using ECC-Based Homomorphic Encryption. Int. J. Inf. Secur. Priv. 11(3): 54-62 (2017) - [j36]SK Hafizul Islam, G. P. Biswas:
A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. J. King Saud Univ. Comput. Inf. Sci. 29(1): 63-73 (2017) - [j35]SK Hafizul Islam, Ruhul Amin, G. P. Biswas, Mohammad Sabzinejad Farash, Xiong Li, Saru Kumari:
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J. King Saud Univ. Comput. Inf. Sci. 29(3): 311-324 (2017) - [j34]Prerna Mohit, Ruhul Amin, Arijit Karati, G. P. Biswas, Muhammad Khurram Khan:
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System. J. Medical Syst. 41(4): 50:1-50:13 (2017) - [j33]Prerna Mohit, Ruhul Amin, G. P. Biswas:
Design of authentication protocol for wireless sensor network-based smart vehicular system. Veh. Commun. 9: 64-71 (2017) - [j32]Daya Sagar Gupta, G. P. Biswas:
On Securing Bi- and Tri-partite Session Key Agreement Protocol Using IBE Framework. Wirel. Pers. Commun. 96(3): 4505-4524 (2017) - [j31]Shweta R. Malwe, Naman Taneja, G. P. Biswas:
Enhancement of DSR and AODV Protocols Using Link Availability Prediction. Wirel. Pers. Commun. 97(3): 4451-4466 (2017) - [c32]Prerna Mohit, Ruhul Amin, G. P. Biswas:
Design of Secure and Efficient Electronic Payment System for Mobile Users. ICMC 2017: 34-43 - 2016
- [j30]Ruhul Amin, G. P. Biswas:
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks 36: 58-80 (2016) - [j29]Shweta R. Malwe, G. P. Biswas:
Analysis and enhancement of pair-wise code assignment scheme used in Code Division Multiple Access protocol. Comput. Electr. Eng. 56: 157-170 (2016) - [j28]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Lu Leng, Neeraj Kumar:
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Networks 101: 42-62 (2016) - [j27]Shweta R. Malwe, G. P. Biswas:
Routing and CDMA-MAC based cross-layering for wireless ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 21(4): 245-258 (2016) - [j26]Arijit Karati, G. P. Biswas:
Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme. Secur. Commun. Networks 9(17): 4060-4074 (2016) - [j25]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar:
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Networks 9(17): 4650-4666 (2016) - [j24]Sangram Ray, G. P. Biswas, Mou Dasgupta:
Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 90(3): 1331-1354 (2016) - [c31]Prerna Mohit, G. P. Biswas:
Confidentiality and Storage of Data in Cloud Environment. FICTA (2) 2016: 289-295 - [c30]Anindya Kumar Biswas, S. Mukhopadhyay, G. P. Biswas:
Design of Visual Cryptography Scheme Using C(m, w) Combinations. FICTA (2) 2016: 447-455 - [c29]Arijit Karati, G. P. Biswas:
A practical identity based signcryption scheme from bilinear pairing. ICACCI 2016: 832-836 - [c28]Prerna Mohit, G. P. Biswas:
Modification of Symmetric-Key DES into Efficient Asymmetric-Key DES using RSA. ICTCS 2016: 136:1-136:5 - [c27]Shweta R. Malwe, Soniya Rohilla, G. P. Biswas:
Location and selective-bordercast based enhancement of zone routing protocol. RAIT 2016: 83-88 - [c26]Minu Tiwari, Soumyashree S. Panda, G. P. Biswas:
An improved secure remote login protocol with three-factor authentication. RAIT 2016: 372-378 - [c25]Anurag Gupta, Prema Mohit, Arijit Karati, Ruhul Amin, G. P. Biswas:
Malicious node detection using ID-based authentication technique. RAIT 2016: 398-403 - [c24]Ruhul Amin, SK Hafizul Islam, Arijit Karati, G. P. Biswas:
Design of an enhanced authentication protocol and its verification using AVISPA. RAIT 2016: 404-409 - 2015
- [j23]Daya Sagar Gupta, G. P. Biswas:
Secure Computation on Cloud Storage: A Homomorphic Approach. J. Cases Inf. Technol. 17(3): 22-29 (2015) - [j22]SK Hafizul Islam, G. P. Biswas:
Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system. J. King Saud Univ. Comput. Inf. Sci. 27(2): 211-221 (2015) - [j21]Ruhul Amin, G. P. Biswas:
A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS. J. Medical Syst. 39(3): 33 (2015) - [j20]Ruhul Amin, G. P. Biswas:
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity. J. Medical Syst. 39(8): 78 (2015) - [j19]Ruhul Amin, G. P. Biswas:
An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS. J. Medical Syst. 39(8): 79 (2015) - [j18]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Mohammad S. Obaidat:
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System. J. Medical Syst. 39(11): 137:1-137:20 (2015) - [j17]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Xiong Li:
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems. J. Medical Syst. 39(11): 140:1-140:21 (2015) - [j16]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Neeraj Kumar:
An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. J. Medical Syst. 39(11): 180 (2015) - [j15]SK Hafizul Islam, G. P. Biswas:
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys. Wirel. Pers. Commun. 82(4): 2727-2750 (2015) - [j14]Ruhul Amin, G. P. Biswas:
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment. Wirel. Pers. Commun. 84(1): 439-462 (2015) - [c23]Arijit Karati, G. P. Biswas:
Cryptanalysis of Zheng Et al.'s Pairing-Free Secure IBE Scheme. ICIT 2015: 101-106 - [c22]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan:
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. CyberSA 2015: 1-7 - [c21]Rajeev Kumar, Ruhul Amin, Arijit Karati, G. P. Biswas:
Secure Remote Login Scheme with Password and Smart Card Update Facilities. FICTA 2015: 495-505 - [i2]Ruhul Amin, G. P. Biswas:
Cryptanalysis of a Markov Chain Based User Authentication Scheme. IACR Cryptol. ePrint Arch. 2015: 656 (2015) - 2014
- [j13]Sangram Ray, G. P. Biswas:
Design of an efficient mobile health system for achieving HIPAA privacy-security regulations. Int. J. Wirel. Mob. Comput. 7(4): 378-387 (2014) - [j12]SK Hafizul Islam, G. P. Biswas:
A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings. J. King Saud Univ. Comput. Inf. Sci. 26(1): 55-67 (2014) - [j11]SK Hafizul Islam, G. P. Biswas:
Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings. J. King Saud Univ. Comput. Inf. Sci. 26(1): 89-97 (2014) - [j10]Sangram Ray, G. P. Biswas:
A Certificate Authority (CA)-based cryptographic solution for HIPAA privacy/security regulations. J. King Saud Univ. Comput. Inf. Sci. 26(2): 170-180 (2014) - [c20]Shweta R. Malwe, G. P. Biswas:
TCA-PCA based hybrid code assignment for enhancement and easy deployability of CDMA protocol. ICACCI 2014: 1395-1401 - [c19]Gourav Kumar, Puja Rani, G. P. Biswas:
Modification of AODV for enhanced data delivery. ISCIT 2014: 71-75 - [c18]Shweta R. Malwe, G. P. Biswas:
Dynamic Clustering Based Hybrid Routing Protocol for Mobile Ad Hoc Networks. RAIT 2014: 3-9 - [c17]Sankar Mukherjee, G. P. Biswas:
Design of Hybrid MAC Protocol for Wireless Sensor Network. RAIT 2014: 11-18 - [c16]Manoj K. Mishra, SK Hafizul Islam, G. P. Biswas:
Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC. RAIT 2014: 27-34 - [e1]G. P. Biswas, Sushanta Mukhopadhyay:
Recent Advances in Information Technology - RAIT-2014 Proceedings [Dhanbad, India, 13-15 March, 2014]. Advances in Intelligent Systems and Computing 266, Springer 2014, ISBN 978-81-322-1855-5 [contents] - 2013
- [j9]SK Hafizul Islam, G. P. Biswas:
Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography. Int. J. Comput. Math. 90(11): 2244-2258 (2013) - [j8]Mou Dasgupta, G. P. Biswas, Chandan Bhar:
Design of network topology based on delay-cost sink tree. Int. J. Commun. Networks Distributed Syst. 10(2): 146-162 (2013) - [j7]SK Hafizul Islam, G. P. Biswas:
Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ. Comput. Inf. Sci. 25(1): 51-61 (2013) - [j6]SK Hafizul Islam, G. P. Biswas:
Design of improved password authentication and update scheme based on elliptic curve cryptography. Math. Comput. Model. 57(11-12): 2703-2717 (2013) - 2012
- [j5]SK Hafizul Islam, G. P. Biswas:
A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks. Ann. des Télécommunications 67(11-12): 547-558 (2012) - [j4]Mou Dasgupta, G. P. Biswas:
Design of multi-path data routing algorithm based on network reliability. Comput. Electr. Eng. 38(6): 1433-1443 (2012) - [c15]Sangram Ray, G. P. Biswas:
An ECC based public key infrastructure usable for mobile applications. CCSEIT 2012: 562-568 - [c14]SK Hafizul Islam, G. P. Biswas:
Certificateless strong designated verifier multisignature scheme using bilinear pairings. ICACCI 2012: 540-546 - [c13]SK Hafizul Islam, G. P. Biswas:
Design of an efficient ID-based short designated verifier proxy signature scheme. RAIT 2012: 48-53 - [c12]Mou Dasgupta, G. P. Biswas, Chandan Bhar:
Optimization of multiple objectives and topological design of data networks using genetic algorithm. RAIT 2012: 256-262 - [c11]Milan Kumar Dholey, G. P. Biswas:
Node-blockage reduction and removal of hidden-terminal problem of CSMA/CA MAC protocol. RAIT 2012: 321-324 - [c10]Priyam Jain, G. P. Biswas:
Design and implementation of an enhanced rate adaptation scheme for wireless LAN Ieee-802.11. RAIT 2012: 336-340 - 2011
- [j3]Pavan Kumar Pandey, G. P. Biswas:
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS. Int. J. Handheld Comput. Res. 2(4): 82-94 (2011) - [j2]G. P. Biswas:
Establishment of Authenticated Secret Session Keys Using Digital Signature Standard. Inf. Secur. J. A Glob. Perspect. 20(1): 9-16 (2011) - [j1]SK Hafizul Islam, G. P. Biswas:
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11): 1892-1898 (2011) - [c9]SK Hafizul Islam, G. P. Biswas:
Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment. ACC (2) 2011: 628-635 - [c8]Sangram Ray, G. P. Biswas:
Design of Mobile-PKI for using mobile phones in various applications. ReTIS 2011: 297-302 - [i1]Arup Kumar Pal, G. P. Biswas, S. Mukhopadhyay:
Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling of Codebook and Index Matrix. CoRR abs/1111.7051 (2011) - 2010
- [c7]Mou Dasgupta, G. P. Biswas:
Approximation of the Node-Pair Reliability of Data Communication Networks. DSDE 2010: 5-9 - [c6]Pavan Kumar Pandey, G. P. Biswas:
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS. AST/UCMA/ISA/ACN 2010: 397-408
2000 – 2009
- 2008
- [c5]Sachin Tripathi, G. P. Biswas:
Modification of Channel Based IP Multicasting to Support Many to Many Communications. International Conference on Internet Computing 2008: 195-199 - 2000
- [c4]Biplab K. Sikdar, Kolin Paul, Gosta Pada Biswas, Parimal Pal Chaudhuri, Vamsi Boppana, Cliff Yang, Sobhan Mukherjee:
Theory and Application of GF(2p) Cellular Automata as On-chip Test Pattern Generator. VLSI Design 2000: 556-561
1990 – 1999
- 1997
- [c3]Gosta Pada Biswas, Idranil Sen Gupta:
Design of t-UED/AUED Codes from Berger's AUED Code. VLSI Design 1997: 364-369 - [c2]Gosta Pada Biswas, Indranil Sengupta:
A Design Technique of TSC Checker for Borden's Code. VLSI Design 1997: 529-530 - 1995
- [c1]Gosta Pada Biswas, Idranil Sen Gupta:
Generalized modular design of testable m-out-of-n code checker. Asian Test Symposium 1995: 322-326
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint