[go: up one dir, main page]

Follow
Janaka Alawatugoda
Janaka Alawatugoda
Rabdan Academy, Abu Dhabi, UAE
Verified email at eng.pdn.ac.lk
Title
Cited by
Cited by
Year
Modelling after-the-fact leakage for key exchange
J Alawatugoda, D Stebila, C Boyd
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
642014
Continuous after-the-fact leakage-resilient key exchange
J Alawatugoda, C Boyd, D Stebila
australasian conference on information security and privacy, 258-273, 2014
482014
A review of the nist lightweight cryptography finalists and their fault analyses
H Madushan, I Salam, J Alawatugoda
Electronics 11 (24), 4199, 2022
462022
A new frontier in streamflow modeling in ungauged basins with sparse data: a modified generative adversarial network with explainable AI
U Perera, DTS Coralage, IU Ekanayake, J Alawatugoda, DPP Meddage
Results in Engineering 21, 101920, 2024
392024
Continuous after-the-fact leakage-resilient eck-secure key exchange
J Alawatugoda, D Stebila, C Boyd
Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015
382015
On advances of lattice-based cryptographic schemes and their implementations
H Bandara, Y Herath, T Weerasundara, J Alawatugoda
Cryptography 6 (4), 56, 2022
37*2022
A review of machine learning and internet-of-things on the water quality assessment: methods, applications and future trends
G Dharmarathne, A Abekoon, M Bogahawaththa, J Alawatugoda, ...
Results in Engineering, 105182, 2025
342025
Unveiling copy-move forgeries: Enhancing detection with SuperPoint keypoint architecture
A Diwan, D Kumar, R Mahadeva, HCS Perera, J Alawatugoda
IEEE Access 11, 86132-86148, 2023
252023
Nanosensors in hazardous explosives trace detection-challenges and Future directions
S Khan, U Valiyaneerilakkal, S Kumar, A Singh, A Ahmed, HCS Perera, ...
Microchemical Journal 200, 110474, 2024
192024
Protecting encrypted cookies from compression side-channel attacks
J Alawatugoda, D Stebila, C Boyd
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
182015
Countermeasures against Bernstein's remote cache timing attack
J Alawatugoda, D Jayasinghe, R Ragel
2011 6th International Conference on Industrial and Information Systems, 43-48, 2011
182011
On the leakage-resilient key exchange
J Alawatugoda
Journal of Mathematical Cryptology 11 (4), 215-269, 2017
132017
Water desalination using PSO-ANN techniques: a critical review
R Mahadeva, M Kumar, V Gupta, G Manik, V Gupta, J Alawatugoda, ...
Digital Chemical Engineering 9, 100128, 2023
112023
Mixed-reality based multi-agent robotics framework for artificial swarm intelligence experiments
D Karunarathna, N Jaliyagoda, G Jayalath, J Alawatugoda, R Ragel, ...
IEEE Access 11, 105718-105733, 2023
112023
Generic construction of an eCK-secure key exchange protocol in the standard model
J Alawatugoda
International Journal of Information Security 16 (5), 541-557, 2017
102017
Analyzing transportation mode interactions using agent-based models
N Uthpala, N Hansika, S Dissanayaka, K Tennakoon, S Dharmarathne, ...
SN Applied Sciences 5 (12), 357, 2023
92023
On power analysis attacks against hardware stream ciphers
RD Silva, I Navaratna, M Kumarasiri, J Alawatugoda, CC Wen
International Journal of Information and Computer Security 17 (1-2), 21-35, 2022
92022
Software implementation level countermeasures against the cache timing attack on advanced encryption standard
U Herath, J Alawatugoda, R Ragel
2013 IEEE 8th International Conference on Industrial and Information Systems …, 2013
92013
Peer-to-peer energy trading through swarm intelligent Stackelberg game
C Edussuriya, U Marikkar, S Wickramasinghe, U Jayasinghe, ...
Energies 16 (5), 2434, 2023
82023
Bat—block analytics tool integrated with blockchain based iot platform
C Edussuriya, K Vithanage, N Bandara, J Alawatugoda, M Sandirigama, ...
Electronics 9 (9), 1525, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20