[go: up one dir, main page]

Follow
Bubu Bhuyan
Bubu Bhuyan
Associate Professor in Information Technology , North Eastern Hill University
Verified email at nehu.ac.in - Homepage
Title
Cited by
Cited by
Year
Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR
S Deb, B Bhuyan
Multimedia Tools and Applications 80 (13), 19803-19826, 2021
702021
A novel approach towards realizing optimum data transfer and Automatic Variable Key (AVK) in cryptography
P Chakrabarti, B Bhuyan, A Chowdhuri, C Bhunia
IJCSNS 8 (5), 241, 2008
662008
Using game theory to model DoS attack and defence
B Kumar, B Bhuyan
Sādhanā 44 (12), 245, 2019
402019
Colour image encryption using an improved version of stream cipher and chaos
S Deb, B Bhuyan, N Kar, KS Reddy
International Journal of Ad Hoc and Ubiquitous Computing 41 (2), 118-133, 2022
392022
Performance analysis of current lightweight stream ciphers for constrained environments
S Deb, B Bhuyan
Sādhanā 45 (1), 256, 2020
272020
Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field
S Deb, B Biswas, B Bhuyan
Multimedia Tools and Applications 78 (24), 34901-34925, 2019
272019
Game theoretical defense mechanism against reputation based sybil attacks
B Kumar, B Bhuyan
Procedia Computer Science 167, 2465-2477, 2020
162020
Study and scope of signcryption for cloud data access control
S Debnath, MVL Nunsanga, B Bhuyan
Advances in Computer, Communication and Control: Proceedings of ETES 2018 …, 2019
142019
Design and analysis of LFSR-based stream cipher
S Deb, B Bhuyan, NC Gupta
Proceedings of the International Conference on Computing and Communication …, 2018
142018
A new public key scheme based on integer factorization and discrete logarithm
P Goswami, MM Singh, B Bhuyan
Palestine Journal of Mathematics 6 (2), 580-584, 2017
122017
NMRMG: Nonlinear multiple-recursive matrix generator design approaches and its randomness analysis
S Deb, S Pal, B Bhuyan
Wireless Personal Communications 125 (1), 577-597, 2022
102022
A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance
SC Sahana, ML Das, B Bhuyan
Sādhanā 44 (6), 132, 2019
102019
Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices
S Deb, B Bhuyan
ICT Express 4 (1), 19-23, 2018
102018
Application of. Automatic Variable Key (AVK) in RSA
P Chakrabarti, B Bhuyan, A Chowdhuri, CT Bhunia
International Journal HIT Transactions on ECCN 2 (5), 2007
92007
Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing
S Debnath, B Bhuyan
Multiagent and Grid Systems 15 (2), 99-119, 2019
82019
Quantum-Resistant Hash-Based Digital Signature Schemes: A Review
S Panthi, B Bhuyan
International Conference on Frontiers in Computing and Systems, 637-655, 2023
62023
A new public key scheme based on DRSA and generalized GDLP
P Goswami, MM Singh, B Bhuyan
Discrete Mathematics, Algorithms and Applications 8 (04), 1650057, 2016
62016
Cover selection for image steganography determined by distinct characteristics.
R Jamatia, B Bhuyan
2023 12th International Conference on Advanced Computing (ICoAC), 1-8, 2023
52023
A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve.
SC Sahana, B Bhuyan
Int. J. Netw. Secur. 21 (1), 145-152, 2019
42019
Efficient and scalable outsourced data access control with user revocation in cloud: a comprehensive study
S Debnath, B Bhuyan
Multiagent and Grid Systems 14 (4), 383-401, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20