LB-IDS: Securing wireless sensor network using protocol layer trust-based intrusion detection system U Ghugar, J Pradhan, SK Bhoi, RR Sahoo Journal of Computer Networks and Communications 2019, 2019 | 51 | 2019 |
Evaluation of performance characteristics of cryptosystem using text files. C Narasimham, J Pradhan Journal of Theoretical & Applied Information Technology 4 (1), 2008 | 50 | 2008 |
Performance analysis of public key cryptographic systems rsa and ntru N Challa, J Pradhan International Journal of Computer Science and Network Security 7 (8), 87-96, 2007 | 42 | 2007 |
PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks U Ghugar, J Pradhan, SK Bhoi, RR Sahoo, SK Panda International Journal of Information Technology 10, 489-494, 2018 | 33 | 2018 |
A matrix formulation for NTRU cryptosystem R Nayak, CV Sastry, J Pradhan 2008 16th IEEE International Conference on Networks, 1-5, 2008 | 24 | 2008 |
A novel intrusion detection system for detecting black hole attacks in wireless sensor network using AODV protocol U Ghugar, J Pradhan, M Biswal IJCSN-International Journal of Computer Science and Network 5 (4), 2016 | 17 | 2016 |
Survey of wormhole attack in wireless sensor networks U Ghugar, J Pradhan Computer Science and Information Technologies 2 (1), 33-42, 2021 | 14 | 2021 |
A review on Wormhole attacks in wireless sensor networks U Ghugar, J Pradhan International Journal of Information Communication Technology and Digital …, 2019 | 10 | 2019 |
ML-IDS: MAC layer trust-based intrusion detection system for wireless sensor networks U Ghugar, J Pradhan Computational Intelligence in Data Mining: Proceedings of the International …, 2020 | 9 | 2020 |
A study on black hole attack in wireless sensor networks U Ghugar, J Pradhan International Journal of Advance Computing Techniqueand Applications (IJACTA …, 2017 | 9 | 2017 |
Algorithmic comparison between polynomial base and matrix base NTRU cryptosystem R Nayak, CV Sastry, J Pradhan International Journal of Computer and Network Security,(IJCNS) Vol 2, 2010 | 9 | 2010 |
NL-IDS: Trust based intrusion detection system for network layer in wireless sensor networks U Ghugar, J Pradhan 2018 Fifth International Conference on Parallel, Distributed and Grid …, 2018 | 8 | 2018 |
Minimizing cost using cloud computing with RFID based supply chain management P Pattnayak, J Pradhan International Journal of Control Theory and Applications 9 (20), 159-164, 2016 | 5 | 2016 |
Intrusion detection system in wireless sensor networks for wormhole attack using trust-based system U Ghugar, J Pradhan Handbook of Research on Information Security in Biomedical Signal Processing …, 2018 | 3 | 2018 |
GridNtru: high performance PKCS N Challa, J Pradhan Proc. 26th World Academy of Science, Engineering And Technology, 540-543, 2007 | 3 | 2007 |
On optimal weighted binary trees J Pradhan, CV Sastry International Journal of High Speed Computing 7 (03), 445-464, 1995 | 3 | 1995 |
Lower bounds to the external pathlength of a lopsided binary tree CV Sastry, J Pradhan International Journal of High Speed Computing 4 (03), 169-178, 1992 | 3 | 1992 |
Optimizing the network flow in cloud supply chain management PS Pattnayak, SS Patra, J Pradhan International Journal of u-and e-Service, Science and Technology 10 (5), 43-54, 2017 | 2 | 2017 |
Reaction attacks in the matrix scheme of NTRU cryptosystem R Nayak, J Pradhan, CV Sastry International Conference on Advances in Information Technology and Mobile …, 2011 | 2 | 2011 |
NTRU Cryptosystem with Companion Matrix B Tripathi, K Thakur, R Nayak, C Sastry, J Pradhan A matrix formulation for NTRU cryptosystem, 1-5, 2008 | 2 | 2008 |