SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage SK Nayak, S Tripathy IEEE Transactions on Services Computing, 2018 | 31 | 2018 |
IECA: an efficient IoT friendly image encryption technique using programmable cellular automata S Roy, U Rawat, HA Sareen, SK Nayak Journal of Ambient Intelligence and Humanized Computing 11 (11), 5083-5102, 2020 | 30 | 2020 |
IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata S Roy, M Shrivastava, CV Pandey, SK Nayak, U Rawat Multimedia Tools and Applications 80 (21), 31529-31567, 2021 | 20 | 2021 |
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage SK Nayak, S Tripathy International Journal of Information Security 19 (2), 229-240, 2020 | 14 | 2020 |
A Secure and Efficient Color Image Encryption Scheme based on Two Chaotic Systems and Advanced Encryption Standard P Nayak, SK Nayak, S Das 2018 International Conference on Advances in Computing, Communications and …, 2018 | 11 | 2018 |
CLB-ECC: Certificateless Blind Signature Using ECC SK Nayak, S Mohanty, B Majhi Journal of Information Processing Systems 13 (4), 970-986, 2017 | 11 | 2017 |
Privacy preserving provable data possession for cloud based electronic health record system SK Nayak, S Tripathy 2016 IEEE Trustcom/BigDataSE/ISPA, 860-867, 2016 | 10 | 2016 |
An ECDLP based untraceable blind signature scheme SK Nayak, B Majhi, S Mohanty 2013 International Conference on Circuits, Power and Computing Technologies …, 2013 | 10 | 2013 |
IESCA: An efficient image encryption scheme using 2-D cellular automata S Roy, M Shrivastava, U Rawat, CV Pandey, SK Nayak Journal of Information Security and Applications 61, 102919, 2021 | 8 | 2021 |
SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys SK Nayak, S Tripathy IEEE Transactions on Emerging Topics in Computing 9 (1), 414-428, 2018 | 5 | 2018 |
On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks R Shashidhara, SK Nayak, AK Das, Y Park IEEE Access 9, 12879-12895, 2021 | 4 | 2021 |
Blind Signature Schemes using Elliptic Curve Cryptography SK Nayak | 3 | 2013 |
SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage SK Nayak, S Tripathy International Conference on Information Systems Security, 50-67, 2017 | 2 | 2017 |
Privacy preserving provable data possession for cloud based EHR system SK Nayak, S Tripathy IEEE, 2016 | 2 | 2016 |
SEPS: Efficient public-key based secure search over outsourced data SK Nayak, S Tripathy Journal of Information Security and Applications 61, 102932, 2021 | 1 | 2021 |
SDNGuard: An Extension in Software Defined Network to Defend DoS Attack JS Maddu, S Tripathy, SK Nayak 2019 IEEE Region 10 Symposium (TENSYMP), 44-49, 2019 | 1 | 2019 |
Computation Infrastructure: Data Offloading, Processing, and Privacy Y Koganti, R Yadav, SK Nayak, M Chaturvedi Recent Advancements in ICT Infrastructure and Applications, 91, 2022 | | 2022 |
IETD: a novel image encryption technique using Tinkerbell map and Duffing map for IoT applications TA Dhopavkar, SK Nayak, S Roy Multimedia Tools and Applications, 1-40, 2022 | | 2022 |
Design and Analysis of Techniques for Secure Cloud Storage Services SK Nayak IIT Patna, 2019 | | 2019 |
BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications RK Das, SK Nayak, SK Bhoi, SK Choudhury, B Majhi, S Mohanty Computers 5 (4), 32, 2016 | | 2016 |