Follow
Bubu Bhuyan
Bubu Bhuyan
Associate Professor in Information Technology , North Eastern Hill University
Verified email at nehu.ac.in - Homepage
Title
Cited by
Cited by
Year
A novel approach towards realizing optimum data transfer and Automatic Variable Key (AVK) in cryptography
P Chakrabarti, B Bhuyan, A Chowdhuri, C Bhunia
IJCSNS 8 (5), 241, 2008
622008
Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR
S Deb, B Bhuyan
Multimedia Tools and Applications 80, 19803-19826, 2021
362021
Using game theory to model DoS attack and defence
B Kumar, B Bhuyan
Sādhanā 44 (12), 245, 2019
322019
Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field
S Deb, B Biswas, B Bhuyan
Multimedia Tools and Applications 78, 34901-34925, 2019
222019
Performance analysis of current lightweight stream ciphers for constrained environments
S Deb, B Bhuyan
Sādhanā 45, 1-12, 2020
152020
Study and scope of signcryption for cloud data access control
S Debnath, MVL Nunsanga, B Bhuyan
Advances in Computer, Communication and Control: Proceedings of ETES 2018 …, 2019
142019
Game theoretical defense mechanism against reputation based sybil attacks
B Kumar, B Bhuyan
Procedia Computer Science 167, 2465-2477, 2020
122020
Design and analysis of LFSR-based stream cipher
S Deb, B Bhuyan, NC Gupta
Proceedings of the International Conference on Computing and Communication …, 2018
122018
A new public key scheme based on integer factorization and discrete logarithm
P Goswami, MM Singh, B Bhuyan
Palestine Journal of Mathematics 6 (2), 580-584, 2017
112017
Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices
S Deb, B Bhuyan
ICT Express 4 (1), 19-23, 2018
102018
Application of. Automatic Variable Key (AVK) in RSA
P Chakrabarti, B Bhuyan, A Chowdhuri, CT Bhunia
International Journal HIT Transactions on ECCN 2 (5), 2007
92007
A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance
SC Sahana, ML Das, B Bhuyan
Sādhanā 44, 1-9, 2019
72019
Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing
S Debnath, B Bhuyan
Multiagent and Grid Systems 15 (2), 99-119, 2019
62019
A new public key scheme based on DRSA and generalized GDLP
P Goswami, MM Singh, B Bhuyan
Discrete Mathematics, Algorithms and Applications 8 (04), 1650057, 2016
62016
Efficient and scalable outsourced data access control with user revocation in cloud: a comprehensive study
S Debnath, B Bhuyan
Multiagent and Grid Systems 14 (4), 383-401, 2018
42018
An efficient key escrow-free identity-based signature scheme
SC Sahana, B Bhuyan, ML Das
Int J Appl Eng Res 12 (19), 8964-8971, 2017
42017
A new public key encryption scheme based on two cryptographic assumptions
P Goswami, MM Singh, B Bhuyan
Malaya Journal of Matematik 3 (04), 419-422, 2015
42015
Implementation of Automatic Variable Key with Chaos Theory and Studies Thereof.
B Bhuyan, P Chakrabarti, A Chowdhuri, F Masulli, CT Bhunia
IUP Journal of Computer Sciences 5 (4), 2011
42011
Colour image encryption using an improved version of stream cipher and chaos
S Deb, B Bhuyan, N Kar, KS Reddy
International Journal of Ad Hoc and Ubiquitous Computing 41 (2), 118-133, 2022
32022
A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve.
SC Sahana, B Bhuyan
Int. J. Netw. Secur. 21 (1), 145-152, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20