default search action
Debasis Giri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Harinandan Tunga, Samarjit Kar, Debasis Giri:
Multi-objective brainstorm optimization algorithm based on Bayesian inference learning automaton for solving CVRP with time windows. Appl. Soft Comput. 162: 111755 (2024) - [j41]Palash Ray, Debasis Giri, Weizhi Meng, Soumyadeep Hore:
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection. Multim. Tools Appl. 83(19): 56569-56618 (2024) - [j40]Abhishek Bisht, Ashok Kumar Das, Debasis Giri:
Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey. Secur. Priv. 7(2) (2024) - [j39]Somnath Maji, Samir Maity, Sumanta Bsau, Debasis Giri, Manoranjan Maiti:
Varied offspring memetic algorithm with three parents for a realistic synchronized goods delivery and service problem. Soft Comput. 28(5): 4235-4265 (2024) - 2023
- [j38]Somnath Maji, Kunal Pradhan, Samir Maity, Izabela Ewa Nielsen, Debasis Giri, Manoranjan Maiti:
Multipath traveling purchaser problem with time-dependent market structure using quantum-inspired variable length genetic algorithm. Comput. Ind. Eng. 186: 109710 (2023) - [j37]Somnath Maji, Kunal Pradhan, Samir Maity, Izabela Ewa Nielsen, Debasis Giri, Manoranjan Maiti:
Emergent multipath COVID-19 specimen collection problem with green corridor through variable length GA. Expert Syst. Appl. 232: 120879 (2023) - [j36]Palash Ray, Asish Bera, Debasis Giri, Debotosh Bhattacharjee:
Style matching CAPTCHA: match neural transferred styles to thwart intelligent attacks. Multim. Syst. 29(4): 1865-1895 (2023) - [j35]Supriyo De, Jaydeb Bhaumik, Debasis Giri, Ashok Kumar Das:
A new robust and fragile scheme based on chaotic maps and dwt for medical image security. Multim. Tools Appl. 82(8): 11753-11792 (2023) - [j34]Subrata Dutta, Arindam Giri, Debasis Giri, Sarmistha Neogy, Keshav P. Dahal, Wenbing Chen:
Optimum Node Deployment Policy (ONDP) for WSN: Trade-off Between Maximization of Area Coverage and Lifetime. Wirel. Pers. Commun. 133(2): 1055-1080 (2023) - [c20]Anurag Pal, Tanmoy Maitra, Debasis Giri:
Prediction of Depression using Emotion and Sentiment Analysis. OCIT 2023: 909-914 - [c19]Chanchal Patra, Debasis Giri, Mohammad S. Obaidat, Tanmoy Maitra:
SMSDect: A Prediction Model for Smishing Attack Detection Using Machine Learning and Text Analysis. GLOBECOM 2023: 3837-3842 - 2022
- [j33]Dharminder Dharminder, Uddeshaya Kumar, Ashok Kumar Das, Basudeb Bera, Debasis Giri, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues:
Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for IoT applications. Trans. Emerg. Telecommun. Technol. 33(9) (2022) - [j32]Supriyo De, Jaydeb Bhaumik, Debasis Giri:
A secure image encryption scheme based on three different chaotic maps. Multim. Tools Appl. 81(4): 5485-5514 (2022) - [j31]Mohamad Mulham Belal, Tanmoy Maitra, Debasis Giri, Ashok Kumar Das:
Chaotic neural networks and farfalle construction based parallel keyed secure hash function. Secur. Priv. 5(6) (2022) - [c18]Supriyo De, Jaydeb Bhaumik, Debasis Giri:
A New Image Encryption Based on Two Chaotic Maps and Affine Transform. CICBA 2022: 100-114 - [p2]Tanmoy Maitra, Pinaki Sankar Chatterjee, Debasis Giri:
Security Frameworks for Green Mobile Cloud Computing. Green Mobile Cloud Computing 2022: 133-150 - [e7]Debasis Giri, Kim-Kwang Raymond Choo, Saminathan Ponnusamy, Weizhi Meng, Sedat Akleylek, Santi Prasad Maity:
Proceedings of the Seventh International Conference on Mathematics and Computing - ICMC 2021, Shibpur, India, . Advances in Intelligent Systems and Computing 1412, Springer 2022, ISBN 978-981-16-6889-0 [contents] - 2021
- [j30]Ashok Kumar Das, Basudeb Bera, Debasis Giri:
AI and Blockchain-Based Cloud-Assisted Secure Vaccine Distribution and Tracking in IoMT-Enabled COVID-19 Environment. IEEE Internet Things Mag. 4(2): 26-32 (2021) - [j29]Tanmoy Maitra, Shiwangi Singh, Ritwik Saurabh, Debasis Giri:
Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map. J. Inf. Secur. Appl. 61: 102915 (2021) - [j28]Anup Kumar Maurya, Ashok Kumar Das, Sajjad Shaukat Jamal, Debasis Giri:
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters. J. Syst. Archit. 120: 102296 (2021) - [j27]Subhransu Das, Mohammad S. Obaidat, Subhabrata Barman, Debasis Giri:
Novel Multiparameter Detection and Recovery Technique for Diverse Network Systems. IEEE Syst. J. 15(3): 4612-4622 (2021) - [j26]Rajdeep Chatterjee, Saptarshi Mazumdar, R. Simon Sherratt, Rohit Halder, Tanmoy Maitra, Debasis Giri:
Real-Time Speech Emotion Analysis for Smart Home Assistants. IEEE Trans. Consumer Electron. 67(1): 68-76 (2021) - [p1]Tanmoy Maitra, Debasis Giri, Arup Sarkar:
Security in Critical Communication for Mobile Edge Computing Based IoE Applications. Mobile Edge Computing 2021: 315-332 - [e6]Debasis Giri, Anthony T. S. Ho, S. Ponnusamy, Nai-Wei Lo:
Proceedings of the Fifth International Conference on Mathematics and Computing - ICMC 2019, Bhubaneswar, India, February 6-9, 2019. Advances in Intelligent Systems and Computing 1170, Springer 2021, ISBN 978-981-15-5410-0 [contents] - [e5]Debasis Giri, Rajkumar Buyya, S. Ponnusamy, Debashis De, Andrew Adamatzky, Jemal H. Abawajy:
Proceedings of the Sixth International Conference on Mathematics and Computing - ICMC 2020, Gangtok, Sikkim, India, September 2020. Advances in Intelligent Systems and Computing 1262, Springer 2021, ISBN 978-981-15-8060-4 [contents] - 2020
- [j25]Zeeshan Ali, Anwar Ghani, Imran Khan, Shehzad Ashraf Chaudhry, SK Hafizul Islam, Debasis Giri:
A robust authentication and access control protocol for securing wireless healthcare sensor networks. J. Inf. Secur. Appl. 52: 102502 (2020) - [c17]Debasis Giri, Tanmoy Maitra:
A Geometric-Based User Authentication Scheme for Multi-server Architecture: Cryptanalysis and Enhancement. ICMC 2020: 15-27 - [c16]Debkumar Bera, Biswapati Jana, Partha Chowdhuri, Debasis Giri:
Weighted Matrix-Based Random Data Hiding Scheme Within a Pair of Interpolated Image. ICMC 2020: 89-102 - [e4]Oscar Castillo, Dipak Kumar Jana, Debasis Giri, Arif Ahmed:
Recent Advances in Intelligent Information Systems and Applied Mathematics, International Conference on Information Technology and Applied Mathematics, ICITAM 2019, Haldia, India, 7-9 March 2019. Studies in Computational Intelligence 863, Springer 2020, ISBN 978-3-030-34151-0 [contents]
2010 – 2019
- 2019
- [j24]Tanmoy Maitra, Debasis Giri, Ram N. Mohapatra:
SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol. Cryptologia 43(3): 212-232 (2019) - [j23]Tanmoy Maitra, Mohammad S. Obaidat, Debasis Giri, Subrata Dutta, Keshav P. Dahal:
ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications. IET Networks 8(5): 289-298 (2019) - [j22]Subrata Dutta, Mohammad S. Obaidat, Keshav P. Dahal, Debasis Giri, Sarmistha Neogy:
M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes. IEEE Syst. J. 13(1): 215-225 (2019) - [j21]Subrata Dutta, Mohammad S. Obaidat, Keshav P. Dahal, Debasis Giri, Sarmistha Neogy:
Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN. IEEE Syst. J. 13(1): 289-300 (2019) - [c15]Palash Ray, Debasis Giri, Salil Kumar, Priya Sahoo:
FP-Captcha: An Improved Captcha Design Scheme Based on Face Points. ICITAM 2019: 218-233 - [c14]Sharmistha Halder (Jana), Debasis Giri, Barun Das, Goutam Panigrahi, Manoranjan Maiti:
4-Dimensional Transportation Problem for Substitute and Complementary Items Under Rough Environment. ICITAM 2019: 855-872 - [c13]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Debasis Giri:
On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks. ICMC 2019: 1-17 - [c12]Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Debasis Giri:
Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture. ICMC 2019: 47-66 - [e3]Peeyush Chandra, Debasis Giri, Fagen Li, Samarjit Kar, Dipak Kumar Jana:
Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30 - November 1, 2017. Advances in Intelligent Systems and Computing 699, Springer 2019, ISBN 978-981-10-7589-6 [contents] - 2018
- [j20]Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal:
Dual image based reversible data hiding scheme using (7, 4) hamming code. Multim. Tools Appl. 77(1): 763-785 (2018) - [j19]Dipankar Dey, Debasis Giri, Biswapati Jana, Tanmoy Maitra, Ram N. Mohapatra:
Linear-feedback shift register-based multi-ant cellular automation and chaotic map-based image encryption. Secur. Priv. 1(6) (2018) - [c11]Partha Chowdhuri, Biswapati Jana, Debasis Giri:
A Novel Steganographic Scheme Using Weighted Matrix in Transform Domain. ICMC 2018: 27-35 - [c10]Joy Dutta, Yong Wang, Tanmoy Maitra, SK Hafizul Islam, Bharat S. Rawal, Debasis Giri:
ES3B: Enhanced Security System for Smart Building Using IoT. SmartCloud 2018: 158-165 - [e2]Debdas Ghosh, Debasis Giri, Ram N. Mohapatra, Ekrem Savas, Kouichi Sakurai, L. P. Singh:
Mathematics and Computing - 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers. Communications in Computer and Information Science 834, Springer 2018, ISBN 978-981-13-0022-6 [contents] - 2017
- [j18]Tanmoy Maitra, Mohammad S. Obaidat, Ruhul Amin, SK Hafizul Islam, Shehzad Ashraf Chaudhry, Debasis Giri:
A robust ElGamal-based password-authentication protocol using smart card for client-server communication. Int. J. Commun. Syst. 30(11) (2017) - [j17]Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal:
Partial reversible data hiding scheme using (7, 4) hamming code. Multim. Tools Appl. 76(20): 21691-21706 (2017) - [j16]Ruhul Amin, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, Saru Kumari:
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. Secur. Commun. Networks 2017: 5989151:1-5989151:15 (2017) - [j15]Ruhul Amin, R. Simon Sherratt, Debasis Giri, SK Hafizul Islam, Muhammad Khurram Khan:
A software agent enabled biometric security algorithm for secure file access in consumer storage devices. IEEE Trans. Consumer Electron. 63(1): 53-61 (2017) - [j14]Ruhul Amin, Tanmoy Maitra, Debasis Giri, P. D. Srivastava:
Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card. Wirel. Pers. Commun. 96(3): 4629-4659 (2017) - [c9]Debasis Giri, Mohammad S. Obaidat, Tanmoy Maitra:
SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System. GLOBECOM 2017: 1-6 - [c8]Tanmoy Maitra, Subhabrata Barman, Debasis Giri:
Cluster-Based Energy-Efficient Secure Routing in Wireless Sensor Networks. ICITAM 2017: 23-40 - [c7]Barun Duari, Debasis Giri:
An Ideal and Perfect (t, n) Multi-secret Sharing Scheme Based on Finite Geometry. ICITAM 2017: 85-94 - [e1]Debasis Giri, Ram N. Mohapatra, Heinrich Begehr, Mohammad S. Obaidat:
Mathematics and Computing - Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedings. Communications in Computer and Information Science 655, 2017, ISBN 978-981-10-4641-4 [contents] - 2016
- [j13]Tanmoy Maitra, Ruhul Amin, Debasis Giri, P. D. Srivastava:
An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card. Int. J. Netw. Secur. 18(3): 553-564 (2016) - [j12]Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal:
Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion. Int. J. Netw. Secur. 18(4): 633-643 (2016) - [j11]Tanmoy Maitra, Mohammad S. Obaidat, SK Hafizul Islam, Debasis Giri, Ruhul Amin:
Security analysis and design of an efficient ECC-based two-factor password authentication scheme. Secur. Commun. Networks 9(17): 4166-4181 (2016) - [j10]Tanmoy Maitra, SK Hafizul Islam, Ruhul Amin, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar:
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. Secur. Commun. Networks 9(17): 4615-4638 (2016) - [j9]Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar:
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. Secur. Commun. Networks 9(17): 4650-4666 (2016) - [j8]Debasis Giri, R. Simon Sherratt, Tanmoy Maitra:
A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB Mass Storage Devices. IEEE Trans. Consumer Electron. 62(3): 283-291 (2016) - 2015
- [j7]Subhankar Joardar, Vandana Bhattacherjee, Debasis Giri:
SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs. Int. J. Inf. Commun. Technol. 7(6): 585-606 (2015) - [j6]Debasis Giri, Tanmoy Maitra, Ruhul Amin, P. D. Srivastava:
An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems. J. Medical Syst. 39(1): 145 (2015) - [j5]Debasis Giri, R. Simon Sherratt, Tanmoy Maitra, Ruhul Amin:
Efficient biometric and password based mutual authentication for consumer USB mass storage devices. IEEE Trans. Consumer Electron. 61(4): 491-499 (2015) - [c6]Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal:
An Efficient Data Hiding Scheme using Hamming Error Correcting Code. ICCCT 2015: 360-365 - 2014
- [j4]Tanmoy Maitra, Debasis Giri:
An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment. J. Medical Syst. 38(12): 142 (2014) - 2013
- [c5]Subhankar Joardar, Debasis Giri, Vandana Bhattacherjee:
Probabilistic Approach-Based Congestion-Aware Swarm-Inspired Load-Balancing Multipath Data Routing in MANETs. ICACNI 2013: 409-421 - 2011
- [i2]Ashok Kumar Das, Debasis Giri:
An Identity Based Key Management Scheme in Wireless Sensor Networks. CoRR abs/1103.4676 (2011) - 2010
- [c4]Debasis Giri, Prithayan Barua, P. D. Srivastava, Biswapati Jana:
A Cryptosystem for Encryption and Decryption of Long Confidential Messages. ISA 2010: 86-96
2000 – 2009
- 2008
- [j3]Debasis Giri, P. D. Srivastava:
A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security. Int. J. Netw. Secur. 7(2): 223-234 (2008) - [c3]Debasis Giri, Parmeshwary Dayal Srivastava:
Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards. ISECS 2008: 355-361 - 2007
- [j2]Debasis Giri, Parmeshwary Dayal Srivastava:
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies. Int. J. Netw. Secur. 4(3): 348-354 (2007) - [c2]Debasis Giri, Parmeshwary Dayal Srivastava:
Cryptanalysis and Improvement of Das et al.'s Proxy Signature Scheme. ICIT 2007: 151-154 - [c1]Debasis Giri, Parmeshwary Dayal Srivastava:
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. ICISS 2007: 156-166 - 2006
- [i1]Debasis Giri, P. D. Srivastava:
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings. IACR Cryptol. ePrint Arch. 2006: 274 (2006) - 2003
- [j1]Debajyoti Mukhopadhyay, Debasis Giri, Sanasam Ranbir Singh:
An approach to confidence based page ranking for user oriented Web search. SIGMOD Rec. 32(2): 28-33 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint