Symmetric key based authenticated querying in wireless sensor networks S Banerjee, D Mukhopadhyay Proceedings of the first international conference on Integrated internet ad …, 2006 | 46 | 2006 |
Instance based learning framework for effective behavior profiling and anomaly intrusion detection D Mukhopadhyay, S Banerjee US Patent 7,814,548, 2010 | 31 | 2010 |
Location verification based defense against sybil attack in sensor networks D Mukhopadhyay, I Saha Distributed Computing and Networking: 8th International Conference, ICDCN …, 2006 | 27 | 2006 |
Defending against sybil attacks in sensor networks S Banerjee, D Mukhopadhyay, S Roy US Patent App. 11/258,976, 2007 | 18 | 2007 |
Designing reliable architecture for stateful fault tolerance I Saha, D Mukhopadhyay, S Banerjee 2006 Seventh International Conference on Parallel and Distributed Computing …, 2006 | 16 | 2006 |
Security against sybil attack in wireless sensor network through location verification I Saha, D Mukhopadhyay International Conference on Distributed Computing and Networking, 187-192, 2009 | 8 | 2009 |
Improved algorithm for the widest empty 1-corner corridor GK Das, D Mukhopadhyay, SC Nandy Information processing letters 109 (18), 1060-1065, 2009 | 4 | 2009 |
Automatic model extraction from C code—Abstracter and architecture D Mukhopadhyay Information Systems Design and Intelligent Applications: Proceedings of …, 2015 | 3 | 2015 |
Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking: (Short Paper) I Saha, D Mukhopadhyay International Conference on Information Systems Security, 292-300, 2009 | 3 | 2009 |
A game based model of security for key predistribution schemes in wireless sensor network D Mukhopadhyay, S Roy International Conference on Distributed Computing and Internet Technology …, 2005 | 3 | 2005 |
Model checking in practice: analysis of generic bootloader using SPIN K Das Barman, D Mukhopadhyay International Conference on Formal Engineering Methods, 232-245, 2007 | 2 | 2007 |
A distributed algorithm of fault recovery for stateful failover I Saha, D Mukhopadhyay Theory and Applications of Models of Computation: 4th International …, 2007 | 2 | 2007 |
Improvement over Montgomery Modular Multiplication D Mukhopadhyay Information Systems Security: 17th International Conference, ICISS 2021 …, 2021 | 1 | 2021 |
Efficient multiple-precision integer division algorithm D Mukhopadhyay, SC Nandy Information Processing Letters 114 (3), 152-157, 2014 | 1 | 2014 |
Improved Algorithm for a Widest 1-Corner Corridor GK Das, D Mukhopadhyay, SC Nandy International Workshop on Algorithms and Computation, 83-92, 2009 | 1 | 2009 |
A Sensor Network Design from a Probabilistic Automaton Model of Impersonation Attack S Roy, D Mukhopadhayay, C Thejaswi 2006 1st International Conference on Communication Systems Software …, 2006 | 1 | 2006 |
YAHMD—Yet another heap memory debugger D Mukhopadhyay, SC Nandy 2015 IEEE 2nd International Conference on Recent Trends in Information …, 2015 | | 2015 |
A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks S Banerjee, D Mukhopadhyay, S Roy Information Systems Security: 11th International Conference, ICISS 2015 …, 2015 | | 2015 |
Modeling broadcast, multicast, point to point, and handshake communications over the same channel in a spin model checker KD Barman, D Mukhopadhyay US Patent 7,835,354, 2010 | | 2010 |
Systems Security-Theory of Secured Systems-A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network D Mukhopadhyay, S Roy Lecture Notes in Computer Science 3816, 334-347, 2005 | | 2005 |