


default search action
Prosanta Gope
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Prosanta Gope 0001 — University of Sheffield, UK (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [i2]Daniel Matyas Perendi, Prosanta Gope:
The Language's Impact on the Enigma Machine. IACR Cryptol. ePrint Arch. 2021: 1434 (2021)
2010 – 2019
- 2019
- [j20]Prosanta Gope, Jemin Lee
, Ruei-Hau Hsu, Tony Q. S. Quek
:
Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions. IEEE Consumer Electron. Mag. 8(3): 10-16 (2019) - [j19]Prosanta Gope:
Anonymous mutual authentication with location privacy support for secure communication in M2M home network services. J. Ambient Intell. Humaniz. Comput. 10(1): 153-161 (2019) - 2018
- [j18]Prosanta Gope
, Jemin Lee
, Tony Q. S. Quek
:
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions. IEEE Trans. Inf. Forensics Secur. 13(11): 2831-2843 (2018) - 2017
- [j17]Prosanta Gope:
Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks. J. Inf. Secur. Appl. 35: 160-167 (2017) - [j16]Kun-Fei Yu, Jun Gu
, Tzonelih Hwang, Prosanta Gope:
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Inf. Process. 16(8): 194 (2017) - [j15]Tzonelih Hwang, Prosanta Gope:
IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks. Wirel. Pers. Commun. 94(3): 467-479 (2017) - 2016
- [j14]Tzonelih Hwang, Prosanta Gope:
RT-OCFB: Real-Time Based Optimized Cipher Feedback Mode. Cryptologia 40(1): 1-14 (2016) - [j13]Tzonelih Hwang, Prosanta Gope:
PFC-CTR, PFC-OCB: Efficient stream cipher modes of authencryption. Cryptologia 40(3): 285-302 (2016) - [j12]Prosanta Gope, Tzonelih Hwang:
An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. J. Netw. Comput. Appl. 62: 1-8 (2016) - [j11]Tzonelih Hwang, Prosanta Gope:
Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network. Secur. Commun. Networks 9(7): 667-679 (2016) - [j10]Tzonelih Hwang, Prosanta Gope:
PFX: an essence of authencryption for block-cipher security. Secur. Commun. Networks 9(10): 1186-1197 (2016) - [j9]Prosanta Gope, Tzonelih Hwang:
Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks. IEEE Syst. J. 10(4): 1370-1379 (2016) - [j8]Prosanta Gope
, Tzonelih Hwang:
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks. IEEE Trans. Ind. Electron. 63(11): 7124-7132 (2016) - [c2]Prosanta Gope, Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek
:
Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services. ARES 2016: 247-252 - 2015
- [j7]Prosanta Gope, Tzonelih Hwang:
A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput. Secur. 55: 271-280 (2015) - [j6]Prosanta Gope, Tzonelih Hwang:
Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs. Inf. Technol. Control. 44(3): 329-333 (2015) - [j5]Sheng-Liang Huang, Tzonelih Hwang, Prosanta Gope:
Multi-party quantum private comparison with an almost-dishonest third party. Quantum Inf. Process. 14(11): 4225-4235 (2015) - [j4]Tzonelih Hwang, Prosanta Gope:
IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes. Secur. Commun. Networks 8(18): 3939-3952 (2015) - [j3]Prosanta Gope, Tzonelih Hwang:
Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Wirel. Pers. Commun. 82(4): 2231-2245 (2015) - [j2]Prosanta Gope, Tzonelih Hwang:
Erratum to: Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks. Wirel. Pers. Commun. 82(4): 2247 (2015) - [i1]Prosanta Gope:
Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography. IACR Cryptol. ePrint Arch. 2015: 897 (2015) - 2014
- [j1]Tzonelih Hwang, Prosanta Gope:
Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets. Wirel. Pers. Commun. 77(1): 197-224 (2014) - 2013
- [c1]Tzonelih Hwang, Prosanta Gope:
Provably secure mutual authentication and key agreement scheme with user anonymity. ICICS 2013: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-28 21:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint