Detecting code smells using deep learning AK Das, S Yadav, S Dhal TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 2081-2086, 2019 | 36 | 2019 |
A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System B Baruah, S Dhal Computers & Security 77, 21-35, 2018 | 35 | 2018 |
Deep learning based approach for malaria detection in blood cell images AM Joshi, AK Das, S Dhal 2020 IEEE region 10 conference (TENCON), 241-246, 2020 | 13 | 2020 |
An efficient authentication scheme for secure communication between industrial IoT devices B Baruah, S Dhal 2020 11th International Conference on Computing, Communication and …, 2020 | 11 | 2020 |
A new authentication protocol for RFID communication in multi-tag arrangement S Dhal, IS Gupta 2014 international conference on computing for sustainable global …, 2014 | 9 | 2014 |
A security and privacy preserved intelligent vehicle navigation system B Baruah, S Dhal IEEE Transactions on Dependable and Secure Computing 20 (2), 944-959, 2022 | 8 | 2022 |
A secure road condition monitoring scheme in cloud based VANET B Baruah, S Dhal Computer Communications 174, 131-142, 2021 | 8 | 2021 |
An IoT based secure object tracking system B Baruah, S Dhal Wireless Personal Communications 106 (3), 1209-1242, 2019 | 8 | 2019 |
An authenticated key agreement scheme for secure communication in smart grid B Baruah, S Dhal 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS …, 2021 | 7 | 2021 |
Cloud enabled body area network A Pattanayak, S Dhal Cloud Network Management, 67-85, 2020 | 7 | 2020 |
Automatic privacy-preserving contact tracing of novel coronavirus infection by cloud-enabled wban using blockchain A Pattanayak, S Dhal, SK Addya Cryptology ePrint Archive, 2020 | 7 | 2020 |
An intelligent privacy preserving vehicle navigation system B Baruah, S Dhal 2019 IEEE Region 10 Symposium (TENSYMP), 727-732, 2019 | 4 | 2019 |
Cryptanalysis and improvement of a cloud based login and authentication protocol S Dhal, V Bhuwan 2018 4th International Conference on Recent Advances in Information …, 2018 | 4 | 2018 |
A new authentication protocol for multi-tag RFID applicable to passive tag S Dhal, I Sengupta Procedia Technology 6, 880-888, 2012 | 4 | 2012 |
A Secure and privacy-preserved road condition monitoring system B Baruah, S Dhal 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS …, 2020 | 3 | 2020 |
Privacy preserving password-based multi-server authenticated key agreement protocol using smart card D Mishra, S Dhal Wireless Personal Communications 99, 1-21, 2018 | 3 | 2018 |
Object authentication using RFID technology: A multi-tag approach S Dhal, IS Gupta International Journal of Computer Network and Information Security 7 (4), 44, 2015 | 3 | 2015 |
Managing Authentication and Detection Probability in Multi-tag RFID System. S Dhal, A Basu, IS Gupta Journal of Information Assurance & Security 9 (6), 2014 | 3 | 2014 |
Privacy Preserved Medical Service Provider Selection in Cloud-based Wireless Body Area Network A Pattanayak, M Dutta, S Dhal Wireless Personal Communications 128 (2), 1349-1371, 2023 | 2 | 2023 |
A new object searching protocol for multi-tag RFID S Dhal, I Sen Gupta Wireless Personal Communications 97 (3), 3547-3568, 2017 | 2 | 2017 |