default search action
Vikas Srivastava
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Y. Sreenivasa Rao, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath:
Designing quantum-secure attribute-based encryption. Clust. Comput. 27(9): 13075-13091 (2024) - [j18]Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager:
An efficient quantum oblivious transfer protocol. Clust. Comput. 27(10): 14037-14048 (2024) - [j17]Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar:
Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy-Preserving Ride-Sharing Application. IEEE Internet Things J. 11(1): 1761-1772 (2024) - [j16]Y. Sreenivasa Rao, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath:
Cryptanalysis of a quantum identity-based signature and its improvement. Quantum Inf. Process. 23(9): 318 (2024) - [j15]Vikas Srivastava, Amit K. Singh, Amar Kishor, Nikhil R. Pal:
A Generalized Family of Constant Orness Ordered Weighted Averaging Operators. IEEE Trans. Fuzzy Syst. 32(7): 4062-4073 (2024) - [i11]Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Debasish Roy, Kouichi Sakurai, Sourav Mukhopadhyay:
An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication. CoRR abs/2403.18247 (2024) - [i10]Shabnam Konica, Brian W. Sheldon, Vikas Srivastava:
Role of coupled electrochemistry and stress on the Li-anode instability: A continuum approach. CoRR abs/2405.05837 (2024) - [i9]Kunal Dey, Somnath Kumar, Vikas Srivastava, Sumit Kumar Debnath:
A new approach to delegate signing rights to proxy signers using isogeny-based cryptography. CoRR abs/2407.13318 (2024) - [i8]Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Sumit Kumar Debnath:
An Efficient and Secure Boolean Function Evaluation Protocol. IACR Cryptol. ePrint Arch. 2024: 1787 (2024) - 2023
- [j14]Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stanica, Saibal Kumar Pal:
A multivariate identity-based broadcast encryption with applications to the internet of things. Adv. Math. Commun. 17(6): 1302-1313 (2023) - [j13]Vikas Srivastava, Sumit Kumar Debnath:
A Multivariate-Based Provably Secure Certificateless Signature Scheme With Applications To The Internet Of Medical Things. Comput. J. 66(10): 2499-2516 (2023) - [j12]Vikas Srivastava, Amit K. Singh:
Beta-Bézier OWA operator. Int. J. Approx. Reason. 152: 33-45 (2023) - [j11]Vikas Srivastava, Amar Kishor, Amit K. Singh:
Novel optimistic and pessimistic family of OWA operator with constant orness. Int. J. Approx. Reason. 161: 109006 (2023) - [j10]Vikas Srivastava, Sumit Kumar Debnath, Sharwan K. Tiwari, Harshdeep Singh:
On the security of multivariate-based ring signature and other related primitives. J. Inf. Secur. Appl. 74: 103474 (2023) - [j9]Tapaswini Mohanty, Vikas Srivastava, Sihem Mesnager, Sumit Kumar Debnath:
A constant round quantum secure protocol for oblivious polynomial evaluation. J. Inf. Secur. Appl. 77: 103560 (2023) - [j8]Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu:
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture. J. Cryptogr. Eng. 13(2): 187-199 (2023) - [j7]Vikas Srivastava, Parulpreet Singh, Praveen Kumar Malik, Rajesh Singh, Sudeep Tanwar, Fayez Alqahtani, Amr Tolba, Marina Verdes, Maria Simona Raboaca:
Innovative Spectrum Handoff Process Using a Machine Learning-Based Metaheuristic Algorithm. Sensors 23(4): 2011 (2023) - [c2]Parulpreet Singh, Vikas Srivastava:
Optimal Resource Allocation for Energy Harvested Cognitive Radio Networks Based on Learn Heuristic Algorithm. RTIP2R (2) 2023: 341-354 - [i7]Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stanica:
Quantum Secure Protocols for Multiparty Computations. CoRR abs/2312.16318 (2023) - [i6]Vikas Srivastava, Paresh Baidya, Sumit Kumar Debnath, Sihem Mesnager:
Blockchain-Envisioned Post-Quantum Secure Sanitizable Signature for Audit Logs Management. CoRR abs/2312.16322 (2023) - [i5]Vikas Srivastava, Anubhab Baksi, Sumit Kumar Debnath:
An Overview of Hash Based Signatures. IACR Cryptol. ePrint Arch. 2023: 411 (2023) - [i4]Vikas Srivastava, Sumit Kumar Debnath:
A Multivariate Based Provably Secure Certificateless Signature Scheme with Applications to the Internet of Medical Things. IACR Cryptol. ePrint Arch. 2023: 1153 (2023) - [i3]Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar:
Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy Preserving Ride-Sharing Application. IACR Cryptol. ePrint Arch. 2023: 1154 (2023) - 2022
- [j6]Sijun Niu, Vikas Srivastava:
Ultrasound classification of interacting flaws using finite element simulations and convolutional neural network. Eng. Comput. 38(5): 4653-4662 (2022) - [j5]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing. J. Inf. Secur. Appl. 66: 103127 (2022) - [j4]Kunal Dey, Sumit Kumar Debnath, Pantelimon Stanica, Vikas Srivastava:
A post-quantum signcryption scheme using isogeny based cryptography. J. Inf. Secur. Appl. 69: 103280 (2022) - [j3]Vikas Srivastava, Sanjay Kumar Yadav:
Frequency based Digital Image Forgery Detection Through Optimal Threshold Using SOELTP. EAI Endorsed Trans. Scalable Inf. Syst. 9(4): 1 (2022) - [j2]Vikas Srivastava, Sumit Kumar Debnath, Basudeb Bera, Ashok Kumar Das, Youngho Park, Pascal Lorenz:
Blockchain-Envisioned Provably Secure Multivariate Identity-Based Multi-Signature Scheme for Internet of Vehicles Environment. IEEE Trans. Veh. Technol. 71(9): 9853-9867 (2022) - [i2]Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu:
Mul-IBS: A Multivariate Identity-Based Signature Scheme Compatible with IoT-based NDN Architecture. IACR Cryptol. ePrint Arch. 2022: 1091 (2022) - 2021
- [c1]Vikas Srivastava, Sumit Kumar Debnath:
Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme. ProvSec 2021: 296-308 - [i1]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing. IACR Cryptol. ePrint Arch. 2021: 618 (2021) - 2020
- [j1]Vikas Srivastava, Sachin Tripathi, Karan Singh, Le Hoang Son:
Energy efficient optimized rate based congestion control routing in wireless sensor network. J. Ambient Intell. Humaniz. Comput. 11(3): 1325-1338 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint