| Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR S Deb, B Bhuyan Multimedia Tools and Applications 80 (13), 19803-19826, 2021 | 70 | 2021 |
| A novel approach towards realizing optimum data transfer and Automatic Variable Key (AVK) in cryptography P Chakrabarti, B Bhuyan, A Chowdhuri, C Bhunia IJCSNS 8 (5), 241, 2008 | 66 | 2008 |
| Using game theory to model DoS attack and defence B Kumar, B Bhuyan Sādhanā 44 (12), 245, 2019 | 40 | 2019 |
| Colour image encryption using an improved version of stream cipher and chaos S Deb, B Bhuyan, N Kar, KS Reddy International Journal of Ad Hoc and Ubiquitous Computing 41 (2), 118-133, 2022 | 39 | 2022 |
| Performance analysis of current lightweight stream ciphers for constrained environments S Deb, B Bhuyan Sādhanā 45 (1), 256, 2020 | 27 | 2020 |
| Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field S Deb, B Biswas, B Bhuyan Multimedia Tools and Applications 78 (24), 34901-34925, 2019 | 27 | 2019 |
| Game theoretical defense mechanism against reputation based sybil attacks B Kumar, B Bhuyan Procedia Computer Science 167, 2465-2477, 2020 | 16 | 2020 |
| Study and scope of signcryption for cloud data access control S Debnath, MVL Nunsanga, B Bhuyan Advances in Computer, Communication and Control: Proceedings of ETES 2018 …, 2019 | 14 | 2019 |
| Design and analysis of LFSR-based stream cipher S Deb, B Bhuyan, NC Gupta Proceedings of the International Conference on Computing and Communication …, 2018 | 14 | 2018 |
| A new public key scheme based on integer factorization and discrete logarithm P Goswami, MM Singh, B Bhuyan Palestine Journal of Mathematics 6 (2), 580-584, 2017 | 12 | 2017 |
| NMRMG: Nonlinear multiple-recursive matrix generator design approaches and its randomness analysis S Deb, S Pal, B Bhuyan Wireless Personal Communications 125 (1), 577-597, 2022 | 10 | 2022 |
| A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance SC Sahana, ML Das, B Bhuyan Sādhanā 44 (6), 132, 2019 | 10 | 2019 |
| Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices S Deb, B Bhuyan ICT Express 4 (1), 19-23, 2018 | 10 | 2018 |
| Application of. Automatic Variable Key (AVK) in RSA P Chakrabarti, B Bhuyan, A Chowdhuri, CT Bhunia International Journal HIT Transactions on ECCN 2 (5), 2007 | 9 | 2007 |
| Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing S Debnath, B Bhuyan Multiagent and Grid Systems 15 (2), 99-119, 2019 | 8 | 2019 |
| Quantum-Resistant Hash-Based Digital Signature Schemes: A Review S Panthi, B Bhuyan International Conference on Frontiers in Computing and Systems, 637-655, 2023 | 6 | 2023 |
| A new public key scheme based on DRSA and generalized GDLP P Goswami, MM Singh, B Bhuyan Discrete Mathematics, Algorithms and Applications 8 (04), 1650057, 2016 | 6 | 2016 |
| Cover selection for image steganography determined by distinct characteristics. R Jamatia, B Bhuyan 2023 12th International Conference on Advanced Computing (ICoAC), 1-8, 2023 | 5 | 2023 |
| A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve. SC Sahana, B Bhuyan Int. J. Netw. Secur. 21 (1), 145-152, 2019 | 4 | 2019 |
| Efficient and scalable outsourced data access control with user revocation in cloud: a comprehensive study S Debnath, B Bhuyan Multiagent and Grid Systems 14 (4), 383-401, 2018 | 4 | 2018 |