Get my own profile
Public access
View all4 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Dr Avishek AdhikariProfessor, Department of Mathematics, Presidency UniversityVerified email at presiuniv.ac.in
- Partha Sarathi RoySchool of Computing and Information Technology; University of Wollongong.Verified email at uow.edu.au
- Sushmita RujSenior Lecturer, UNSW, SydneyVerified email at unsw.edu.au
- Shion Samadder ChaudhuryAssistant Professor, IAI, TCG CRESTVerified email at tcgcrest.org
- Shinsaku KiyomotoKDDI Research Inc.Verified email at kddi-research.jp
- Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
- Kirill MorozovUniversity of North Texas, USAVerified email at unt.edu
- Jyotirmoy PramanikTaki Government College, Taki, IndiaVerified email at tgc.ac.in
- Raghvendra RohitLead Cryptographer, Technology Innovation Institute, Abu DhabiVerified email at tii.ae
- Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
- Angsuman DasPresidency University, KolkataVerified email at presiuniv.ac.in
- Shaoquan JiangUniversity of WindsorVerified email at uwindsor.ca
- Arinjita PaulCryptographer, Niobium MicrosystemsVerified email at niobiummicrosystems.com
- Snehasis AddyUniversity of Massachusetts AmherstVerified email at umass.edu