Follow
Dr. Jayaprakash Kar
Dr. Jayaprakash Kar
Verified email at lnmiit.ac.in - Homepage
Title
Cited by
Cited by
Year
Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network
J Kar
Cryptology ePrint Archive, 2012
372012
Public key infrastructure: A survey
A Albarqi, E Alzaid, F Al Ghamdi, S Asiri, J Kar
Journal of Information Security 6 (01), 31, 2014
342014
Mitigating threats and security metrics in cloud computing
J Kar, MR Mishra
Journal of Information Processing Systems 12 (2), 226-233, 2016
312016
Provably secure identity-based aggregate signcryption scheme in random oracles
J Kar
Cryptology ePrint Archive, 2013
262013
A research survey on applications of consensus protocols in blockchain
S Kaur, S Chaturvedi, A Sharma, J Kar
Security and Communication Networks 2021, 2021
242021
ID-based deniable authentication protocol based on Diffie-Hellman problem on elliptic curve
J Kar
International Journal of Network Security, Taiwan, 2013
212013
An efficient password security of multi-party key exchange protocol based on ECDLP
J Kar
Computer Science Journals, MALAYSIA 3 (5), 2009
182009
A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique
J Kar, B Majhi
Proceedings of the 2011 International Conference on Communication, Computing …, 2011
132011
An efficient password security of three party key exchange protocol based on ECDLP
J Kar
Cryptographic Protocols, 2009
132009
A study on diffie-hellman key exchange protocols
MR Mishra, J Kar
International Journal of Pure and Applied Mathematics 114 (2), 179-189, 2017
112017
Conventional and improved digital signature scheme: A comparative study
AD Alrehily, AF Alotaibi, SB Almutairy, MS Alqhtani, J Kar
Journal of information Security 6 (01), 59, 2015
112015
Study of the security enhancements in various e-mail systems
AS Babrahem, ET Alharbi, AM Alshiky, SS Alqurashi, J Kar
Journal of Information Security 6 (01), 1, 2014
112014
A secure and lightweight protocol for message authentication in wireless sensor networks
J Kar, K Naik, T Abdelkader
IEEE Systems Journal 15 (3), 3808-3819, 2020
102020
A novel construction of certificateless signcryption scheme for smart card
J Kar
Case Studies in Secure Computing Achievements and Trends, 437-456, 2014
102014
An efficient and lightweight deniably authenticated encryption scheme for e-mail security
J Kar, K Naik, T Abdelkader
IEEE Access 7, 184207-184220, 2019
92019
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks.
J Kar
IACR Cryptol. ePrint Arch. 2013, 747, 2013
82013
Proxy Blind Multi-signature Scheme using ECC for handheld devices
J Kar
Cryptology ePrint Archive, 2011
82011
Certificateless public key cryptography: A research survey
J Sayid, I Sayid, J Kar
International Journal of Security and Its Applications 10 (7), 103-118, 2016
62016
Cryptographic protocols for secure cloud computing
SA Alhumrani, J Kar
International Journal of Security and Its Applications 10 (2), 301-310, 2016
62016
Security and privacy of big data in various applications
AM AlMutairi, RAT AlBukhary, J Kar
International Journal of Big Data Security Intelligence 2 (1), 19-24, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20