关注
Swapnoneel Roy
Swapnoneel Roy
Associate Professor, University of North Florida
在 unf.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An energy complexity model for algorithms
S Roy, A Rudra, A Verma
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
852013
Content delivery networks: State of the art, trends, and future roadmap
B Zolfaghari, G Srivastava, S Roy, HR Nemati, F Afghah, T Koshiba, ...
ACM Computing Surveys (CSUR) 53 (2), 1-34, 2020
532020
Cryptanalysis and improvement of ECC based authentication and key exchanging protocols
S Roy, C Khatwani
Cryptography 1 (1), 9, 2017
252017
Security analysis of ECC based authentication protocols
C Khatwani, S Roy
2015 International conference on computational intelligence and …, 2015
172015
Energy aware algorithmic engineering
S Roy, A Rudra, A Verma
2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014
152014
Automated optimal dispatching of service requests
A Verma, NV Desai, A Bhamidipaty, AN Jain, J Nallacherry, S Roy, ...
2011 Annual SRII Global Conference, 426-429, 2011
152011
Multi-robot information gathering for precision agriculture: Current state, scope, and challenges
A Dutta, S Roy, OP Kreidl, L Bölöni
IEEE Access 9, 161416-161430, 2021
142021
On vulnerability analysis of several password authentication protocols
K Garrett, SR Talluri, S Roy
Innovations in Systems and Software Engineering 11, 167-176, 2015
142015
Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication
S Roy, AK Das, Y Li
30th IEEE International Performance Computing and Communications Conference, 1-7, 2011
112011
Cache attacks on blockchain based information centric networks: an experimental evaluation
S Roy, FJA Morais, M Salimitari, M Chatterjee
Proceedings of the 20th International Conference on Distributed Computing …, 2019
102019
On the scalability and effectiveness of a cache pollution based DoS attack in information centric networks
J Gouge, A Seetharam, S Roy
2016 International Conference on Computing, Networking and Communications …, 2016
102016
Energy efficient merkle trees for blockchains
C Castellon, S Roy, P Kreidl, A Dutta, L Bölöni
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
92021
Denial of service attack on protocols for smart grid communications
S Roy
Research Anthology on Combating Denial-of-Service Attacks, 560-578, 2021
82021
Attacks and vulnerability analysis of e-mail as a password reset point
C Routh, B DeCrescenzo, S Roy
2018 Fourth International Conference on Mobile and Secure Services …, 2018
72018
On sorting under special transpositions
J Huang, S Roy
2014 IEEE International Conference on Bioinformatics and Bioengineering, 325-328, 2014
72014
Block sorting is apx-hard
NS Narayanaswamy, S Roy
International Conference on Algorithms and Complexity, 377-389, 2015
62015
Complex-valued neural network in signal processing: A study on the effectiveness of complex valued generalized mean neuron model
A Pande, AK Thakur, S Roy
Proc. World Academy of Science, Engineering and Technology 27 (2), 240-245, 2008
62008
Secure multi-robot adaptive information sampling
T Samman, J Spearman, A Dutta, OP Kreidl, S Roy, L Bölöni
2021 IEEE International Symposium on Safety, Security, and Rescue Robotics …, 2021
52021
Multi-robot information sampling using deep mean field reinforcement learning
T Said, J Wolbert, S Khodadadeh, A Dutta, OP Kreidl, L Bölöni, S Roy
2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2021
52021
Biometrics data security techniques for portable mobile devices
S Roy, S Matloob, A Seetharam, A Rameshbabu, WC O’Dell, WI Davis
Inae Letters 2, 123-131, 2017
52017
系统目前无法执行此操作,请稍后再试。
文章 1–20