Performance evaluation of RSA and elliptic curve cryptography SR Singh, AK Khan, SR Singh
2016 2nd International Conference on Contemporary Computing and Informatics …, 2016
46 2016 Power analysis attack: A vulnerability to smart card security HJ Mahanta, AK Azad, AK Khan
2015 International Conference on Signal Processing and Communication …, 2015
34 2015 A critical review on elliptic curve cryptography SR Singh, AK Khan, TS Singh
2016 International Conference on Automatic Control and Dynamic Optimization …, 2016
29 2016 Side channel attacks and their mitigation techniques AK Khan, HJ Mahanta
2014 First International Conference on Automation, Control, Energy and …, 2014
22 2014 Artificial intelligence for cybersecurity: Threats, attacks and mitigation A Chakraborty, A Biswas, AK Khan
Artificial Intelligence for Societal Issues, 3-25, 2023
20 2023 A new key management scheme for wireless sensor networks using an elliptic curve SR Singh, AK Khan, TS Singh
Indian Journal of Science and Technology, 2017
17 2017 Securing RSA against power analysis attacks through non‐uniform exponent partitioning with randomisation HJ Mahanta, AK Khan
IET Information Security 12 (1), 25-33, 2018
12 2018 Differential power analysis: Attacks and resisting techniques HJ Mahanta, AK Azad, AK Khan
Information Systems Design and Intelligent Applications: Proceedings of …, 2015
12 2015 Distance based multi single hop low energy adaptive clustering hierarchy (MS LEACH) routing protocol in wireless sensor network TS Singh, R Soram, AK Khan
2016 IEEE 6th International Conference on Advanced Computing (IACC), 613-617, 2016
11 2016 Secure online payment through facial recognition and proxy detection with the help of TripleDES encryption R Venkatesan, B Anni Princy, VD Ambeth Kumar, M Raghuraman, ...
Journal of Discrete Mathematical Sciences and Cryptography 24 (8), 2195-2205, 2021
10 2021 Privacy preservation with RTT‐based detection for wireless mesh networks AK Roy, AK Khan
IET Information Security 14 (4), 391-400, 2020
9 2020 A noble approach for self learning and cluster based routing protocol with power efficiency in WSN S Chakraborty, AK Khan
2014 International Conference on Communication and Signal Processing, 773-777, 2014
9 2014 Application of graphs in computing reduced area VLSI channel routing solutions A Pal, AK Khan, SS Sau, AK Datta, RK Pal, A Chaudhuri
Proc. of International Conference on Computing and Systems (ICCS-2010), 249-256, 2010
9 2010 A new efficient topological structure for floorplanning in 3D VLSI physical design AK Khan, R Vatsa, S Roy, B Das
2014 IEEE International Advance Computing Conference (IACC), 696-701, 2014
8 2014 Search for new physics in the lepton plus missing transverse momentum final state in proton-proton collisions at = 13 TeV A Tumasyan, W Adam, JW Andrejkovic, T Bergauer, S Chatterjee, ...
Journal of High Energy Physics 2022 (7), 1-57, 2022
7 2022 RTT based wormhole detection for wireless mesh networks AK Roy, AK Khan
International Journal of Information Technology 12 (2), 539-546, 2020
7 2020 A new approach for gateway-level load balancing of wmns through k-means clustering B Das, AK Roy, AK Khan, S Roy
2014 International Conference on Computational Intelligence and …, 2014
7 2014 Gateway-level load balancing techniques for WMN: A comparative study B Das, AK Roy, AK Khan, S Roy
2014 Fourth International Conference on Communication Systems and Network …, 2014
7 2014 Evaluation of wireless sensor network routing protocols with respect to power efficiency S Chakraborty, AK Khan
2013 5th International Conference and Computational Intelligence and …, 2013
7 2013 Language resource building and English-to-mizo neural machine translation encountering tonal words V Khenglawt, SR Laskar, S Pal, P Pakray, AK Khan
Proceedings of the WILDRE-6 Workshop within the 13th Language Resources and …, 2022
6 2022