Swapnoneel Roy
Swapnoneel Roy
Associate Professor, University of North Florida
Verified email at - Homepage
Cited by
Cited by
An energy complexity model for algorithms
S Roy, A Rudra, A Verma
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
Content delivery networks: State of the art, trends, and future roadmap
B Zolfaghari, G Srivastava, S Roy, HR Nemati, F Afghah, T Koshiba, ...
ACM Computing Surveys (CSUR) 53 (2), 1-34, 2020
Cryptanalysis and improvement of ECC based authentication and key exchanging protocols
S Roy, C Khatwani
Cryptography 1 (1), 9, 2017
Security analysis of ECC based authentication protocols
C Khatwani, S Roy
2015 International conference on computational intelligence and …, 2015
Automated optimal dispatching of service requests
A Verma, NV Desai, A Bhamidipaty, AN Jain, J Nallacherry, S Roy, ...
2011 Annual SRII Global Conference, 426-429, 2011
On vulnerability analysis of several password authentication protocols
K Garrett, SR Talluri, S Roy
Innovations in Systems and Software Engineering 11 (3), 167-176, 2015
Energy aware algorithmic engineering
S Roy, A Rudra, A Verma
2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014
Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication
S Roy, AK Das, Y Li
30th IEEE International Performance Computing and Communications Conference, 1-7, 2011
Cache attacks on blockchain based information centric networks: an experimental evaluation
S Roy, FJA Morais, M Salimitari, M Chatterjee
Proceedings of the 20th International Conference on Distributed Computing …, 2019
On the scalability and effectiveness of a cache pollution based DoS attack in information centric networks
J Gouge, A Seetharam, S Roy
2016 International Conference on Computing, Networking and Communications …, 2016
On sorting under special transpositions
J Huang, S Roy
2014 IEEE International Conference on Bioinformatics and Bioengineering, 325-328, 2014
Complex-valued neural network in signal processing: A study on the effectiveness of complex valued generalized mean neuron model
A Pande, AK Thakur, S Roy
Proc. World Academy of Science, Engineering and Technology 27 (2), 240-245, 2008
Denial of service attack on protocols for smart grid communications
S Roy
Research Anthology on Combating Denial-of-Service Attacks, 560-578, 2021
Attacks and vulnerability analysis of e-mail as a password reset point
C Routh, B DeCrescenzo, S Roy
2018 Fourth International Conference on Mobile and Secure Services …, 2018
Biometrics Data Security Techniques for Portable Mobile Devices
S Roy, S Matloob, A Seetharam, A Rameshbabu, WC O’Dell, WI Davis
Inae Letters 2 (3), 123-131, 2017
Block sorting is apx-hard
NS Narayanaswamy, S Roy
International Conference on Algorithms and Complexity, 377-389, 2015
Energy oriented vulnerability analysis on authentication protocols for cps
PD Harish, S Roy
2014 IEEE International Conference on Distributed Computing in Sensor …, 2014
Towards designing and implementing a secure one time password (OTP) authentication system
S Roy, M Rutherford, CH Crawshaw
2016 IEEE 35th International Performance Computing and Communications …, 2016
Cryptanalysis and security enhancement of two advanced authentication protocols
SR Talluri, S Roy
Advanced Computing, Networking and Informatics-Volume 2, 307-316, 2014
Approximate strip exchanging
S Roy, AK Thakur
International journal of computational biology and drug design 1 (1), 88-101, 2008
The system can't perform the operation now. Try again later.
Articles 1–20