Swapnoneel Roy
Swapnoneel Roy
Associate Professor, University of North Florida
Bestätigte E-Mail-Adresse bei unf.edu - Startseite
Zitiert von
Zitiert von
An energy complexity model for algorithms
S Roy, A Rudra, A Verma
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
Cryptanalysis and improvement of ECC based authentication and key exchanging protocols
S Roy, C Khatwani
Cryptography 1 (1), 9, 2017
Automated optimal dispatching of service requests
A Verma, NV Desai, A Bhamidipaty, AN Jain, J Nallacherry, S Roy, ...
2011 Annual SRII Global Conference, 426-429, 2011
Security analysis of ECC based authentication protocols
C Khatwani, S Roy
2015 International conference on computational intelligence and …, 2015
On vulnerability analysis of several password authentication protocols
K Garrett, SR Talluri, S Roy
Innovations in Systems and Software Engineering 11 (3), 167-176, 2015
Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication
S Roy, AK Das, Y Li
30th IEEE International Performance Computing and Communications Conference, 1-7, 2011
Content delivery networks: state of the art, trends, and future roadmap
B Zolfaghari, G Srivastava, S Roy, HR Nemati, F Afghah, T Koshiba, ...
ACM Computing Surveys (CSUR) 53 (2), 1-34, 2020
Energy aware algorithmic engineering
S Roy, A Rudra, A Verma
2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014
Cache attacks on blockchain based information centric networks: an experimental evaluation
S Roy, FJA Morais, M Salimitari, M Chatterjee
Proceedings of the 20th International Conference on Distributed Computing …, 2019
On the scalability and effectiveness of a cache pollution based DoS attack in information centric networks
J Gouge, A Seetharam, S Roy
2016 International Conference on Computing, Networking and Communications …, 2016
Denial of service attack on protocols for smart grid communications
S Roy
Research Anthology on Combating Denial-of-Service Attacks, 560-578, 2021
Block sorting is apx-hard
NS Narayanaswamy, S Roy
International Conference on Algorithms and Complexity, 377-389, 2015
On sorting under special transpositions
J Huang, S Roy
2014 IEEE International Conference on Bioinformatics and Bioengineering, 325-328, 2014
Energy oriented vulnerability analysis on authentication protocols for cps
PD Harish, S Roy
2014 IEEE International Conference on Distributed Computing in Sensor …, 2014
Cryptanalysis and security enhancement of two advanced authentication protocols
SR Talluri, S Roy
Advanced Computing, Networking and Informatics-Volume 2, 307-316, 2014
Complex-valued neural network in signal processing: A study on the effectiveness of complex valued generalized mean neuron model
A Pande, AK Thakur, S Roy
Proc. World Academy of Science, Engineering and Technology 27 (2), 240-245, 2008
Approximate strip exchanging
S Roy, AK Thakur
International journal of computational biology and drug design 1 (1), 88-101, 2008
Algorithms and Design for an Autonomous Biological System
S Roy, AK Thakur, A Pande, M Rahman
Third International Conference on Autonomic and Autonomous Systems (ICAS'07 …, 2007
A cache based dos attack on real information centric networking system
FJA Morais, S Roy, SP Ahuja
2018 IEEE 37th International Performance Computing and Communications …, 2018
Attacks and vulnerability analysis of e-mail as a password reset point
C Routh, B DeCrescenzo, S Roy
2018 Fourth International Conference on Mobile and Secure Services …, 2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20