Follow
Ujan Mukhopadhyay
Ujan Mukhopadhyay
Florida Polytechnic University
Verified email at floridapoly.edu
Title
Cited by
Cited by
Year
A brief survey of cryptocurrency systems
U Mukhopadhyay, A Skjellum, O Hambolu, J Oakley, L Yu, R Brooks
2016 14th annual conference on privacy, security and trust (PST), 745-752, 2016
4372016
A novel digital watermarking technique for video copyright protection
P Ghosh, R Ghosh, S Sinha, U Mukhopadhyay, DK Kole, A Chakroborty
Computer Science and Information Technology, 601-609, 2012
252012
Scrybe: A second-generation blockchain technology with lightweight mining for secure provenance and related applications
C Worley, L Yu, R Brooks, J Oakley, A Skjellum, A Altarawneh, S Medury, ...
Blockchain Cybersecurity, Trust and Privacy, 51-67, 2020
192020
Provenance threat modeling
O Hambolu, L Yu, J Oakley, RR Brooks, U Mukhopadhyay, A Skjellum
2016 14th Annual Conference on Privacy, Security and Trust (PST), 384-387, 2016
102016
2016 14th Annual Conference on Privacy, Security and Trust (PST)
U Mukhopadhyay, A Skjellum, O Hambolu, J Oakley, L Yu, R Brooks
IEEE, 2016
92016
Enhancing the security of digital Video Watermarking using watermark encryption
U Mukhopadhyay, S Sinha, P Ghosh, R Ghosh, DK Kole, A Chakroborty
Proceedings of the Second International Conference on Computational Science …, 2012
42012
Dipak kr
U Mukhopadhyay, S Sinha, P Ghosh, R Ghosh
Kole and Aruna Chakroborty,” Enhancing the Security of Digital Video …, 2012
22012
A Novel Digital Watermarking Technique for Video Copyright Protection: An Advanced Study
P Ghosh, R Ghosh, S Sinha, U Mukhopadhyay, DK Kole, A Chakroborty
BP International, 2021
2021
Developing a Data Provenance System with Version Control Using Blockchain
U Mukhopadhyay
Auburn University, 2021
2021
Devising a Private Multi-Event Multi Authority E-Voting Scheme Using Secret Sharing
U Mukhopadhyay
Journal of Theoretical Physics and Cryptography 5 (ISSN: 2322-3138), 5-6, 2014
2014
Dipak kr. Koleand Aruna,’A Novel Digital Watermarking Technique for Video Copyright Protection’
P Ghosh, R Ghosh, S Sinha, U Mukhopadhyay
International Journal of Computer Science and Network Security 9 (4), 3-7, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–11