BibTeX records: Kumar Sekhar Roy

download as .bib file

@article{DBLP:journals/access/ChowdhuryDRPS24,
  author       = {Keya Chowdhury and
                  Subhrajyoti Deb and
                  Kumar Sekhar Roy and
                  Durgabati Podder and
                  Aditya Kumar Sahu},
  title        = {A Systematic Survey on {TPE} Schemes for the Cloud: Classification,
                  Challenges, and Future Scopes},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {160669--160689},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3479228},
  doi          = {10.1109/ACCESS.2024.3479228},
  timestamp    = {Sat, 30 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChowdhuryDRPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/RoyDK24,
  author       = {Kumar Sekhar Roy and
                  Subhrajyoti Deb and
                  Hemanta Kumar Kalita},
  title        = {A novel hybrid authentication protocol utilizing lattice-based cryptography
                  for IoT devices in fog networks},
  journal      = {Digit. Commun. Networks},
  volume       = {10},
  number       = {4},
  pages        = {989--1000},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dcan.2022.12.003},
  doi          = {10.1016/J.DCAN.2022.12.003},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/RoyDK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/RoySBPH24,
  author       = {Kumar Sekhar Roy and
                  Murikipudi Sujith and
                  Bandi Bhanu and
                  Preethi and
                  Ruhul Amin Hazarika},
  title        = {FPGA-based dual-layer authentication scheme utilizing {AES} and {ECC}
                  for unmanned aerial vehicles},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2024},
  number       = {1},
  pages        = {91},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13638-024-02419-8},
  doi          = {10.1186/S13638-024-02419-8},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejwcn/RoySBPH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijngc/RoyK19,
  author       = {Kumar Sekhar Roy and
                  Hemanta Kumar Kalita},
  title        = {A Quantum Safe User Authentication Protocol for the Internet of Things},
  journal      = {Int. J. Next Gener. Comput.},
  volume       = {10},
  number       = {3},
  year         = {2019},
  url          = {http://perpetualinnovation.net/ojs/index.php/ijngc/article/view/499},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijngc/RoyK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cit/RoyK17,
  author       = {Kumar Sekhar Roy and
                  Hemanta Kumar Kalita},
  title        = {A Survey on Authentication Schemes in IoT},
  booktitle    = {2017 International Conference on Information Technology, {ICIT} 2017,
                  Bhubaneshwar, India, December 21-23, 2017},
  pages        = {202--207},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICIT.2017.56},
  doi          = {10.1109/ICIT.2017.56},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cit/RoyK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}