|
Podder, S., Harsh, A., Pal, J., Kar, N. (2024). An Approach Towards Modification of Playfair Cipher Using 16 X 16 Matrix. In: Tiwari, S., Trivedi, M.C., Kolhe, M.L., Singh, B.K. (eds) Advances in Data and Information Sciences. ICDIS 2023. Lecture Notes in Networks and Systems, vol 796. Springer, Singapore. https://doi.org/10.1007/978-981-99-6906-7_13 |
JAN |
2024 |
|
Pal, P., Ghosh, S., Biswas, P., Kar, N., Sarkar, J.L. (2024). Secured Digital Watermarking Using Neural Networks. In: Kumar Sahu, A. (eds) Multimedia Watermarking. Springer, Singapore. https://doi.org/10.1007/978-981-99-9803-6_3 |
FEB |
2024 |
|
S. Chakraborty, P. Biswas and N. Kar, "A secure Data Hiding Scheme Using LFSR and Modified AES," 2024 IEEE 9th International Conference for Convergence in Technology (I2CT), Pune, India, 2024, pp. 1-6, doi: 10.1109/I2CT61223.2024.10543693. |
JUN |
2024 |
|
A. M. Mujumdar, N. Kar, P. Biswas and A. Mathur, "Qualitative Analysis of Homomorphic Encryption in Medical Field," 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS), Bangalore, India, 2024, pp. 1-6, doi: 10.1109/ICITEICS61368.2024.10625392. |
AUG |
2024 |
|
Das, Sayan, Nirmalya Kar, and Subhrajyoti Deb. "Moving Towards a Quantum Age: Recent Trends in Quantum and Post-Quantum Cryptography." In Advancing Cyber Security Through Quantum Cryptography, edited by Nirbhay Kumar Chaubey and Neha Chaubey, 31-58. Hershey, PA: IGI Global, 2025. https://doi.org/10.4018/979-8-3693-5961-7.ch002 |
OCT |
2024 |
|
S. Ghosh, P. Pal and N. Kar, "An Analysis of Chaos-based Cryptographic Algorithms," 2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT), Erode, India, 2023, pp. 1-7, doi: 10.1109/ICECCT56650.2023.10179844. |
FEB |
2023 |
|
Deb, P., Kar, N., Das, N., Datta, V. (2023). Detecting Malware in Windows Environment Using Machine Learning. In: Singh, S.N., Mahanta, S., Singh, Y.J. (eds) Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology. NICE-DT 2023. Lecture Notes in Networks and Systems, vol 676. Springer, Singapore. https://doi.org/10.1007/978-981-99-1699-3_7 |
FEB |
2023 |
|
Ray, A., Singh, K., Harsh, A., Thorat, S., Kar, N. (2024). Qualitative and Quantitative Analysis of Modifications in Playfair Cipher. In: Dasgupta, K., Mukhopadhyay, S., Mandal, J.K., Dutta, P. (eds) Computational Intelligence in Communications and Business Analytics. CICBA 2023. Communications in Computer and Information Science, vol 1956. Springer, Cham. https://doi.org/10.1007/978-3-031-48879-5_15 |
JAN |
2023 |
|
P. Pal, S. Ghosh and N. Kar, "Attacks on Social Media Networks and Prevention Measures," 2023 International Conference for Advancement in Technology (ICONAT), Goa, India, 2023, pp. 1-6, doi: 10.1109/ICONAT57137.2023.10080106. |
|
2023 |
|
N. Kumar and N. Kar, "Approaches towards Fake News Detection using Machine Learning and Deep Learning," 2023 10th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 2023, pp. 280-285, doi: 10.1109/SPIN57001.2023.10117154. |
|
2023 |
|
Debnath, K., Kar, N. (2023). SMS Spam Detection Using Deep Learning Approach. In: Bhattacharyya, S., Banerjee, J.S., Köppen, M. (eds) Human-Centric Smart Computing. Smart Innovation, Systems and Technologies, vol 316. Springer, Singapore. https://doi.org/10.1007/978-981-19-5403-0_29 |
|
2022 |
|
S. Debnath and N. Kar, "An Approach Towards Data Security Based on DCT and Chaotic Map," 2022 2nd Asian Conference on Innovation in Technology (ASIANCON), 2022, pp. 1-5, doi: 10.1109/ASIANCON55314.2022.9908893. |
|
2022 |
|
K. Debnath and N. Kar, "Email Spam Detection using Deep Learning Approach," 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), 2022, pp. 37-41, doi: 10.1109/COM-IT-CON54601.2022.9850588. |
|
2022 |
|
Das, A.K., Kar, N. (2021). g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function ??(-????)=-??????(??-????). In: Abdullah, N., Manickam, S., Anbar, M. (eds) Advances in Cyber Security. ACeS 2021. Communications in Computer and Information Science, vol 1487. Springer, Singapore. https://doi.org/10.1007/978-981-16-8059-5_6 |
|
2021 |
|
Das, A.K., Kar, N. (2021). A Novel Approach of Text Encryption Using Random Numbers and Hash Table. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_16 |
|
2021 |
|
Das, A.K., Kar, N. (2021). A Novel Approach of Text Encryption Using Random Numbers and Hash Table. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_16 |
|
2021 |
|
Das, A.K., Das, A., Kar, N. (2020). An Approach Towards Encrypting Paired Digits Using Dynamic Programming and Diffie-Hellman Key Exchange. In: Saha, A., Kar, N., Deb, S. (eds) Advances in Computational Intelligence, Security and Internet of Things. ICCISIoT 2019. Communications in Computer and Information Science, vol 1192. Springer, Singapore. https://doi.org/10.1007/978-981-15-3666-3_15 |
|
2020 |
|
Das, A., Das, A.K., Kar, N. (2020). An Improved Chaos Based Medical Image Encryption Using DNA Encoding Techniques. In: Saha, A., Kar, N., Deb, S. (eds) Advances in Computational Intelligence, Security and Internet of Things. ICCISIoT 2019. Communications in Computer and Information Science, vol 1192. Springer, Singapore. https://doi.org/10.1007/978-981-15-3666-3_18 |
|
2020 |
|
Satija, T., Kar, N. (2020). Detecting Malicious Twitter Bots Using Machine Learning. In: Saha, A., Kar, N., Deb, S. (eds) Advances in Computational Intelligence, Security and Internet of Things. ICCISIoT 2019. Communications in Computer and Information Science, vol 1192. Springer, Singapore. https://doi.org/10.1007/978-981-15-3666-3_16 |
|
2020 |
|
Negi, V.S., Kar, N. (2020). Security and Anonymity Aspects in Tails and Windows 10 Operating Systems. In: Kar, N., Saha, A., Deb, S. (eds) Trends in Computational Intelligence, Security and Internet of Things. ICCISIoT 2020. Communications in Computer and Information Science, vol 1358. Springer, Cham. https://doi.org/10.1007/978-3-030-66763-4_17 |
|
2020 |
|
Das, T., Kar, N. (2020). A Novel Cryptographic Approach to Implement Confidentiality Using Point Reflection Property. In: Kar, N., Saha, A., Deb, S. (eds) Trends in Computational Intelligence, Security and Internet of Things. ICCISIoT 2020. Communications in Computer and Information Science, vol 1358. Springer, Cham. https://doi.org/10.1007/978-3-030-66763-4_16 |
|
2020 |
|
Satija, T., Kar, N. (2020). Analysing Social Media Responses in Natural Disaster. In: Kar, N., Saha, A., Deb, S. (eds) Trends in Computational Intelligence, Security and Internet of Things. ICCISIoT 2020. Communications in Computer and Information Science, vol 1358. Springer, Cham. https://doi.org/10.1007/978-3-030-66763-4_9 |
|
2020 |
|
N. Kar, M. A. A. A. Aman, K. Mandal and B. Bhattacharya, "Chaos-based video steganography," 2017 8th International Conference on Information Technology (ICIT), 2017, pp. 482-487, doi: 10.1109/ICITECH.2017.8080046. |
|
2017 |
|
D. Debnath, S. Deb and N. Kar, "An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image Steganography," 2015 International Conference on Computational Intelligence and Networks, 2015, pp. 178-183, doi: 10.1109/CINE.2015.41. |
|
2015 |
|
Das, P., Kar, N. (2015). ILSB: Indicator-Based LSB Steganography. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 309. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2009-1_55 |
|
2015 |
|
Das, P., Kar, N. (2015). A Hybrid Motion Based-Object Tracking Algorithm for VTS. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 309. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2009-1_23 |
|
2015 |
|
Majumdar, A., Podder, T., Majumder, A., Kar, N., Sharma, M. (2015). DNA-Based Cryptographic Approach Toward Information Security. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 308. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2012-1_22 |
|
2015 |
|
Nirmalya Kar, Bhaskar Biswas, Subhrajyoti Deb, Baby Bhattacharya, "DETERMINISTIC FAULT ATTACK OVER THE STREAM CIPHER MICKEY", 12th International Conference on Applied Computing, 2015, Dublin, Ireland, pp:49-55, ISBN: 978-989-8533-45-6. |
|
2015 |
|
Deb, S., Biswas, B., Kar, N. (2015). Study of NLFSR and Reasonable Security Improvement on Trivium Cipher. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 339. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2250-7_73 |
|
2015 |
|
A. Biswas, M. Sharma, T. Poddder and N. Kar, "An approach towards multilevel and multiagent based intrusion detection system," 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 2014, pp. 1787-1790, doi: 10.1109/ICACCCT.2014.7019417. |
|
2014 |
|
A. Majumder, A. Majumdar, T. Podder, N. Kar and M. Sharma, "Secure data communication and cryptography based on DNA based message encoding," 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 2014, pp. 360-363, doi: 10.1109/ICACCCT.2014.7019464. |
|
2014 |
|
P. Das and N. Kar, "A highly secure DNA based image steganography," 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), 2014, pp. 1-5, doi: 10.1109/ICGCCEE.2014.6921419. |
|
2014 |
|
P. Das and N. Kar, "A DNA based image steganography using 2D chaotic map," 2014 International Conference on Electronics and Communication Systems (ICECS), 2014, pp. 1-5, doi: 10.1109/ECS.2014.6892654. |
|
2014 |
|
Majumdar A, Sharma M, Kar N. "An Improved Approach to Steganography using DNA Characteristics", ICCN-2014 Editors: K. R. Venugopal and L. M. Patnaik 2014. |
|
2014 |
|
Nirmalya Kar, Atanu Majumder, Ashim Saha, Anupam Jamatia, Kunal Chakma, and Mukul Chandra Pal. 2013. An improved data security using DNA sequencing. In Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare (MobileHealth '13). Association for Computing Machinery, New York, NY, USA, 13–18. https://doi.org/10.1145/2491148.2491152 |
|
2013 |
|
Singh, L.D.; Das, P.; Kar, N.: 'A Pre-processing Algorithm for Faster Convex Hull Computation', IET Conference Proceedings, 2013, p. 8.01-8.01, DOI: 10.1049/cp.2013.2348, IET Digital Library, |
|
2013 |
|
Kar, N., Roy, S., Saha, A., Chakma, K., Jamatia, A. (2013). A Biometric Based Design Pattern for Implementation of a Security Conscious E-Voting System Using Cryptographic Protocols. In: Das, V.V., Chaba, Y. (eds) Mobile Communication and Power Engineering. AIM 2012. Communications in Computer and Information Science, vol 296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35864-7_11 |
|
2013 |
|
Kar Nirmalya, Majumder Atanu, Saha Ashim, Rudrapal Dwijen. "An Improved DNA Based Cryptosystem", International Conference on Signal, Image Processing and Pattern Recognition (SIPP-2013), February 18-20, 2013, Bangalore, India, Springer LNICST series. |
|
2013 |
|
Prasenjit Das and Nirmalya Kar, "An Improved Trusted Full Disk Encryption Model", K. R. Venugopal, P. Deepa Shenoy and L. M. Patnaik (Eds.) ICDMW 2013, pp. 9–16. 2013
|
|
2013 |
|
M. K. Debbarma, N. Kar and A. Saha, "Static and dynamic software metrics complexity analysis in regression testing," 2012 International Conference on Computer Communication and Informatics, 2012, pp. 1-6, doi: 10.1109/ICCCI.2012.6158825. |
|
2012 |