Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Binanda Sengupta"'
Publikováno v:
IEEE Transactions on Cloud Computing. 10:2090-2101
In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. Secure cloud storage protocols
Publikováno v:
Journal of Computer Security. 29:273-298
In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability of fuzzy signature, and we prove that the fuzzy signature schemes pro
Publikováno v:
ICC 2022 - IEEE International Conference on Communications.
Publikováno v:
IEEE Internet of Things Journal. 7:4997-5007
Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional data authentication does not fit well where an intermediate entity (editor) is required to modify the authenticated data provided
Publikováno v:
ACM Transactions on Internet Technology. 20:1-27
The end-users communicating over a network path currently have no control over the path. For a better quality of service, the source node often opts for a superior (or premium) network path to send packets to the destination node. However, the curren
Publikováno v:
The Computer Journal.
Data owners often encrypt their bulk data and upload it to cloud in order to save storage while protecting privacy of their data at the same time. A data owner can allow a third-party entity to decrypt and access her data. However, if that entity wan
Autor:
Binanda Sengupta
Publikováno v:
Computer Networks. 204:108695
Publikováno v:
Journal of Information Security and Applications. 63:103023
Enterprise networks typically use perimeter-based security to protect their IT resources from security threats originating from outside the enterprise perimeter. In such networks, connection requests from devices residing inside the perimeter are imp
Autor:
Abhijit Das, Binanda Sengupta
Publikováno v:
Applied Mathematics and Computation. 293:204-217
Many cryptographic protocols derive their security from the apparent computational intractability of the integer factorization problem. Currently, the best known integer-factoring algorithms run in subexponential time. Efficient parallel implementati
Publikováno v:
Information Security and Cryptology ISBN: 9783030142339
Inscrypt
Inscrypt
Remote user authentication has found numerous real-world applications, especially in a user-server model. In this work, we introduce the notion of anonymous remote user authentication with k-times untraceability (k-RUA) for a given parameter k, where
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::09aa057362f881f58e36cd97f1c61d84
https://doi.org/10.1007/978-3-030-14234-6_36
https://doi.org/10.1007/978-3-030-14234-6_36