A novel approach towards realizing optimum data transfer and Automatic Variable Key (AVK) in cryptography P Chakrabarti, B Bhuyan, A Chowdhuri, C Bhunia IJCSNS 8 (5), 241, 2008 | 62 | 2008 |
Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR S Deb, B Bhuyan Multimedia Tools and Applications 80, 19803-19826, 2021 | 39 | 2021 |
Using game theory to model DoS attack and defence B Kumar, B Bhuyan Sādhanā 44 (12), 245, 2019 | 32 | 2019 |
Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field S Deb, B Biswas, B Bhuyan Multimedia Tools and Applications 78, 34901-34925, 2019 | 23 | 2019 |
Performance analysis of current lightweight stream ciphers for constrained environments S Deb, B Bhuyan Sādhanā 45, 1-12, 2020 | 15 | 2020 |
Study and scope of signcryption for cloud data access control S Debnath, MVL Nunsanga, B Bhuyan Advances in Computer, Communication and Control: Proceedings of ETES 2018 …, 2019 | 14 | 2019 |
Game theoretical defense mechanism against reputation based sybil attacks B Kumar, B Bhuyan Procedia Computer Science 167, 2465-2477, 2020 | 12 | 2020 |
Design and analysis of LFSR-based stream cipher S Deb, B Bhuyan, NC Gupta Proceedings of the International Conference on Computing and Communication …, 2018 | 12 | 2018 |
A new public key scheme based on integer factorization and discrete logarithm P Goswami, MM Singh, B Bhuyan Palestine Journal of Mathematics 6 (2), 580-584, 2017 | 11 | 2017 |
Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices S Deb, B Bhuyan ICT Express 4 (1), 19-23, 2018 | 10 | 2018 |
Application of. Automatic Variable Key (AVK) in RSA P Chakrabarti, B Bhuyan, A Chowdhuri, CT Bhunia International Journal HIT Transactions on ECCN 2 (5), 2007 | 9 | 2007 |
A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance SC Sahana, ML Das, B Bhuyan Sādhanā 44, 1-9, 2019 | 7 | 2019 |
Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing S Debnath, B Bhuyan Multiagent and Grid Systems 15 (2), 99-119, 2019 | 6 | 2019 |
A new public key scheme based on DRSA and generalized GDLP P Goswami, MM Singh, B Bhuyan Discrete Mathematics, Algorithms and Applications 8 (04), 1650057, 2016 | 6 | 2016 |
Colour image encryption using an improved version of stream cipher and chaos S Deb, B Bhuyan, N Kar, KS Reddy International Journal of Ad Hoc and Ubiquitous Computing 41 (2), 118-133, 2022 | 4 | 2022 |
Efficient and scalable outsourced data access control with user revocation in cloud: a comprehensive study S Debnath, B Bhuyan Multiagent and Grid Systems 14 (4), 383-401, 2018 | 4 | 2018 |
An efficient key escrow-free identity-based signature scheme SC Sahana, B Bhuyan, ML Das Int J Appl Eng Res 12 (19), 8964-8971, 2017 | 4 | 2017 |
A new public key encryption scheme based on two cryptographic assumptions P Goswami, MM Singh, B Bhuyan Malaya Journal of Matematik 3 (04), 419-422, 2015 | 4 | 2015 |
Implementation of Automatic Variable Key with Chaos Theory and Studies Thereof. B Bhuyan, P Chakrabarti, A Chowdhuri, F Masulli, CT Bhunia IUP Journal of Computer Sciences 5 (4), 2011 | 4 | 2011 |
A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve. SC Sahana, B Bhuyan Int. J. Netw. Secur. 21 (1), 145-152, 2019 | 3 | 2019 |