Performance evaluation of RSA and elliptic curve cryptography SR Singh, AK Khan, SR Singh 2016 2nd International Conference on Contemporary Computing and Informatics …, 2016 | 44 | 2016 |
Power analysis attack: A vulnerability to smart card security HJ Mahanta, AK Azad, AK Khan 2015 International Conference on Signal Processing and Communication …, 2015 | 34 | 2015 |
A critical review on elliptic curve cryptography SR Singh, AK Khan, TS Singh 2016 International Conference on Automatic Control and Dynamic Optimization …, 2016 | 29 | 2016 |
Side channel attacks and their mitigation techniques AK Khan, HJ Mahanta 2014 First International Conference on Automation, Control, Energy and …, 2014 | 22 | 2014 |
Artificial intelligence for cybersecurity: Threats, attacks and mitigation A Chakraborty, A Biswas, AK Khan Artificial Intelligence for Societal Issues, 3-25, 2023 | 17 | 2023 |
A new key management scheme for wireless sensor networks using an elliptic curve SR Singh, AK Khan, TS Singh Indian Journal of Science and Technology, 2017 | 17 | 2017 |
Securing RSA against power analysis attacks through non‐uniform exponent partitioning with randomisation HJ Mahanta, AK Khan IET Information Security 12 (1), 25-33, 2018 | 12 | 2018 |
Differential power analysis: Attacks and resisting techniques HJ Mahanta, AK Azad, AK Khan Information Systems Design and Intelligent Applications: Proceedings of …, 2015 | 12 | 2015 |
Distance based multi single hop low energy adaptive clustering hierarchy (MS LEACH) routing protocol in wireless sensor network TS Singh, R Soram, AK Khan 2016 IEEE 6th International Conference on Advanced Computing (IACC), 613-617, 2016 | 11 | 2016 |
Secure online payment through facial recognition and proxy detection with the help of TripleDES encryption R Venkatesan, B Anni Princy, VD Ambeth Kumar, M Raghuraman, ... Journal of Discrete Mathematical Sciences and Cryptography 24 (8), 2195-2205, 2021 | 10 | 2021 |
Privacy preservation with RTT‐based detection for wireless mesh networks AK Roy, AK Khan IET Information Security 14 (4), 391-400, 2020 | 9 | 2020 |
A noble approach for self learning and cluster based routing protocol with power efficiency in WSN S Chakraborty, AK Khan 2014 International Conference on Communication and Signal Processing, 773-777, 2014 | 9 | 2014 |
Application of graphs in computing reduced area VLSI channel routing solutions A Pal, AK Khan, SS Sau, AK Datta, RK Pal, A Chaudhuri Proc. of International Conference on Computing and Systems (ICCS-2010), 249-256, 2010 | 9 | 2010 |
A new efficient topological structure for floorplanning in 3D VLSI physical design AK Khan, R Vatsa, S Roy, B Das 2014 IEEE International Advance Computing Conference (IACC), 696-701, 2014 | 8 | 2014 |
Search for new physics in the lepton plus missing transverse momentum final state in proton-proton collisions at = 13 TeV A Tumasyan, W Adam, JW Andrejkovic, T Bergauer, S Chatterjee, ... Journal of High Energy Physics 2022 (7), 1-57, 2022 | 7 | 2022 |
RTT based wormhole detection for wireless mesh networks AK Roy, AK Khan International Journal of Information Technology 12 (2), 539-546, 2020 | 7 | 2020 |
A new approach for gateway-level load balancing of wmns through k-means clustering B Das, AK Roy, AK Khan, S Roy 2014 International Conference on Computational Intelligence and …, 2014 | 7 | 2014 |
Gateway-level load balancing techniques for WMN: A comparative study B Das, AK Roy, AK Khan, S Roy 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 7 | 2014 |
Evaluation of wireless sensor network routing protocols with respect to power efficiency S Chakraborty, AK Khan 2013 5th International Conference and Computational Intelligence and …, 2013 | 7 | 2013 |
Language resource building and English-to-mizo neural machine translation encountering tonal words V Khenglawt, SR Laskar, S Pal, P Pakray, AK Khan Proceedings of the WILDRE-6 Workshop within the 13th Language Resources and …, 2022 | 6 | 2022 |