Artificial neural synchronization using nature inspired whale optimization

A Sarkar, MZ Khan, MM Singh, A Noorwali… - IEEE …, 2021 - ieeexplore.ieee.org
In this article, a whale optimization-based neural synchronization has been proposed for the
development of the key exchange protocol. At the time of exchange of sensitive information …

Deep learning guided double hidden layer neural synchronization through mutual learning

A Sarkar - Neural Processing Letters, 2021 - Springer
In this paper, a Double Hidden Layer Neural Networks synchronization mechanism using
Generative Adversarial Network (GAN) and mutual learning is used for the development of …

Metaheuristic secured transmission in Telecare Medical Information System (TMIS) in the face of post-COVID-19

J Dey, A Sarkar, S Karforma, B Chowdhury - Journal of Ambient …, 2023 - Springer
The outbreak of novel corona virus had led the entire world to make severe changes. A
secured healthcare data transmission has been proposed through Telecare Medical …

An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key

A Sarkar, K Daripa, MZ Khan, A Noorwali - Soft Computing, 2024 - Springer
For the design of the public-key exchange protocol, a chaos-based Triple-Layer Tree Parity
Machine (TLTPM) directed group neural synchronization is presented in this study. For …

Cryptographic engineering on COVID-19 telemedicine: an intelligent transmission through recurrent relation based session key

J Dey, A Bhowmik, A Sarkar, S Karforma… - Wireless Personal …, 2022 - Springer
Constraints imposed due to the cameo of the novel corona virus has abruptly changed the
operative mode of medical sciences. Most of the hospitals have migrated towards the …

[PDF][PDF] Privileged authenticity in reconstruction of digital encrypted shares

J Dey, A Bhowmik, A Sarkar, S Karforma - IAES Int J Artif Intell (IJ-AI), 2019 - academia.edu
Efficient message reconstruction mechanism depends on the entire partial shares received
in random manner. This paper proposed a technique to ensure the authenticated …

[PDF][PDF] COVID-19 paediatric cavity telecare system: a novel chain key generation and encryption scheme

J Dey - International Journal of Reconfigurable and Embedded …, 2022 - academia.edu
In this unprecedented coronavirus crisis, telehealth had emerged as a substitute way of
treatment. More specifically, paediatric children are at high risk of outside exposure now …

Generative adversarial network guided mutual learning based synchronization of cluster of neural networks

A Sarkar - Complex & Intelligent Systems, 2021 - Springer
Neural synchronization is a technique for establishing the cryptographic key exchange
protocol over a public channel. Two neural networks receive common inputs and exchange …

[HTML][HTML] A novel double tier cryptographic system (nDTCS) to reinforce patients' privacy in contemporary COVID-19 telemedicine

A Bhowmik, J Dey, S Karforma - 2021 - europepmc.org
In this modern COVID-19 telemedicine industry, privacy and security of patients' information
is the most open challenge to keep it intact. Considering the current legal regulations, every …

Establishment of Neural Series Transmission Keys (NSTKs) and Security in the Field of COVID-19 Telepediatric Oral Health

J Dey, S Ahmad, S Karforma - Wireless Personal Communications, 2023 - Springer
In this exceptional COVID-19 crisis, telemedicine had arisen as a substitute technique for
medicines. Even more unequivocally, pediatric children were at high risk to outside homes …