Skip to main content

and
  1. No Access

    Article

    Authenticated key agreement for IoT network using HECC and CRT four co-primes

    Internet of Things (IoT) is an integral part of our daily lives and the security of these devices is paramount. However, IoT devices are often resource constrained, requiring implementations of efficient light...

    Chandan Goswami, Avishek Adhikari in Peer-to-Peer Networking and Applications (2024)

  2. No Access

    Article

    Emission of Polycyclic Aromatic Hydrocarbons from Co-combustion of Coal and Corncob

    The emission of polycyclic aromatic hydrocarbons (PAHs) due to coal co-combustion with corncob (0, 10, 20, and 30%) was studied through a pilot scale drop tube furnace. Total PAHs (∑PAH) emission (gas + partic...

    Reginald E. Masto, Pradeep K. Verma in Proceedings of the National Academy of Sci… (2024)

  3. No Access

    Article

    Strongly-resilient, well connected, non-interactive and gateway-free hierarchical deterministic key agreement schemes using Chinese remainder theorem

    Efficient key agreement schemes (KAS) that manage symmetric key cryptographic (SKC) secrets (or keys) are essential for lightweight security solutions. There exists numerous cost-effective distributed KAS, eit...

    Pinaki Sarkar in Journal of Ambient Intelligence and Humanized Computing (2023)

  4. No Access

    Article

    Investigation on the combustion characteristics of different plant parts of Cassia siamea by DSC-TGA

    Plant parts like root, wood, twig and leaf of Cassia siamea, a fast-growing tree in the abandoned mines of Jharkhand, India, have been considered here as a possible fuel source for decentralized power generation....

    Sangeeta Mukhopadhyay, Pinaki Sarkar in Journal of Thermal Analysis and Calorimetry (2022)

  5. No Access

    Article

    Thermal Behavior of Some Indian Coals: Inferences from Simultaneous Thermogravimetry–Calorimetry and Rock–Eval

    In this work, thermal behaviors of ten coal samples (across different thermal maturity levels) collected from five different open cast mines in the Jharia and Raniganj basins, India, were examined using differ...

    Prasenjeet Chakraborty, Bodhisatwa Hazra, Pinaki Sarkar in Natural Resources Research (2021)

  6. No Access

    Article

    Coal combustion analysis using Rock-Eval: importance of S4-Tpeak

    The Rock-Eval technique has been conventionally used for source-rock analysis. In this work we document the importance of Rock-Eval S4 oxidation graphics and S4-Tpeak as indicators for coal reactivity and thermal...

    Bodhisatwa Hazra, Pinaki Sarkar, Prasenjeet Chakraborty in Arabian Journal of Geosciences (2020)

  7. No Access

    Chapter and Conference Paper

    CRT-KPS: A Key Predistribution Schemes Using CRT

    Key Predistribution Schemes (KPS) are efficient key management solutions that are well suited to establish lightweight symmetric keys even in resource starved environments, like low cost Internet of Things (Io...

    Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi in Information Security and Privacy (2018)

  8. No Access

    Chapter and Conference Paper

    Publicly Verifiable Secret Sharing Scheme in Hierarchical Settings Using CLSC over IBC

    This paper presents a simple construction of an efficient publicly verifiable secret sharing scheme (PVSS) in hierarchical settings that uses bilinear pairing (BLP) maps. Till date, hierarchical secret sharing...

    Pinaki Sarkar, Sukumar Nandi in International Conference on Applications a… (2018)

  9. No Access

    Chapter and Conference Paper

    Frequency Switch, Secret Sharing and Recursive Use of Hash Functions Secure (Low Cost) Ad Hoc Networks

    Low cost ad hoc networks like Wireless Sensor Networks (WSNs) are best suited to gather sensory information. Sensitivity of these classified information leads to the necessity of implementing security protocol...

    Pinaki Sarkar, Morshed Uddin Chowdhury in International Conference on Applications a… (2018)

  10. No Access

    Chapter and Conference Paper

    Secure IoT Using Weighted Signed Graphs

    Key management has always remained a challenging problem for the entire security community. Standard practice in modern times is to agree on symmetric keys using public key protocols. However, public key prot...

    Pinaki Sarkar, Morshed Uddin Chowdhury in Security and Privacy in Communication Networks (2017)

  11. No Access

    Chapter and Conference Paper

    Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks

    Key management is an essential functionality for develo** secure cryptosystems; particularly for implementations to low cost devices of a Distributed Sensor Networks (DSN)–a prototype of Internet of Things (...

    Deepak Kumar Dalai, Pinaki Sarkar in Information Security and Cryptology (2017)

  12. No Access

    Chapter and Conference Paper

    Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet

    Key predistribution schemes (KPS) that establish symmetric secrets are best suited for resource constraint devices of low cost Internet of Things (IoT). Due to the large size of network and the limited memory,...

    Deepak Kumar Dalai, Pinaki Sarkar in Network and System Security (2017)

  13. No Access

    Chapter and Conference Paper

    Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS)

    Key management is a cornerstone requirement for any security solution. Energy efficient key agreement schemes (KAS) that establish symmetric secrets are best suited for resource constraint devices of low cost ...

    Pinaki Sarkar in Network and System Security (2017)

  14. No Access

    Chapter and Conference Paper

    Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi)

    We propose two hierarchical identity based key agreement schemes with unrestricted number of levels. Our solutions use pre-deployment (encrypted) interactions among ancestors using–(i) purely public key crypto...

    Pinaki Sarkar, Morshed Uddin Chowdhury in Applications and Techniques in Information… (2016)

  15. No Access

    Chapter and Conference Paper

    Securing Sensor Networks by Moderating Frequencies

    Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the detail...

    Pinaki Sarkar, Priyatosh Mahish in International Conference on Security and P… (2015)

  16. Chapter and Conference Paper

    Code Based KPD Scheme with Full Connectivity: Deterministic Merging

    Key PreDistribution (KPD) is one of the standard key management techniques of distributing the symmetric cryptographic keys among the resource constrained nodes of a Wireless Sensor Network (WSN). To optimize ...

    Pinaki Sarkar, Aritra Dhar in Information and Communication Technology (2013)

  17. No Access

    Chapter and Conference Paper

    100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks

    Key management in wireless sensor networks (WSN) is a challenging task because of the stringent resource available to the nodes. As such key predistribution (KPD) is regarded as one of the best option for key ...

    Samiran Bag, Aritra Dhar, Pinaki Sarkar in Information Security (2012)

  18. No Access

    Chapter and Conference Paper

    Highly Resilient Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes For Wireless Sensor Network

    Resource constraints of the nodes make security protocols difficult to implement. Thus key management is an important area of research in Wireless Sensor Networks (WSN). Key predistribution (kpd) which involve...

    Samiran Bag, Amrita Saha, Pinaki Sarkar in Advances in Network Security and Applications (2011)

  19. No Access

    Chapter and Conference Paper

    Highly Resilient Communication Using Affine Planes for Key Predistribution and Reed Muller Codes for Connectivity in Wireless Sensor Network

    Wireless Sensor Networks (WSN) consist of low powered and resource constrained sensor nodes which are left unattended for long duration of time. Hence it is very challenging to design and implement cost effect...

    Samiran Bag, Amrita Saha, Pinaki Sarkar in Recent Trends in Wireless and Mobile Networks (2011)

  20. No Access

    Chapter and Conference Paper

    Key Predistribution Scheme Using Finite Fields and Reed Muller Codes

    Resource constraint sensors of a Wireless Sensor Network (WSN) cannot afford the use of costly encryption techniques like public key while dealing with sensitive data. So symmetric key encryption techniques are p...

    Pinaki Sarkar, Morshed U. Chowdhury in Software Engineering, Artificial Intellige… (2011)