C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Ajoy Kumar Khan
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 14
Top Topics
Power Analysis
Modular Exponentiation
Information Security
Intrusion Detection
Top Venues
Innov. Syst. Softw. Eng.
ICCCNT
Int. J. Inf. Secur. Priv.
IET Inf. Secur.
</>
Publications
</>
Paromita Goswami
,
Neetu Faujdar
,
Somen Debnath
,
Ajoy Kumar Khan
,
Ghanshyam Singh
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability.
J. Cloud Comput.
13 (1) (2024)
J. V. N. Raghava Deepthi
,
Ajoy Kumar Khan
,
Tapodhir Acharjee
Multi-level Data Integrity Model with Dual Immutable Digital Key Based Forensic Analysis in IoT Network.
SN Comput. Sci.
5 (1) (2024)
Paromita Goswami
,
Neetu Faujdar
,
Somen Debnath
,
Ajoy Kumar Khan
,
Ghanshyam Singh
ZSS Signature-Based Audit Message Verification Process for Cloud Data Integrity.
IEEE Access
11 (2023)
Abhilash Chakraborty
,
Anupam Biswas
,
Ajoy Kumar Khan
Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation.
CoRR
(2022)
Vanlalmuansangi Khenglawt
,
Sahinur Rahman Laskar
,
Partha Pakray
,
Riyanka Manna
,
Ajoy Kumar Khan
Machine Translation for Low-Resource English-Mizo Pair Encountering Tonal Words.
Computación y Sistemas
26 (3) (2022)
R. Lalduhsaka
,
Nilutpol Bora
,
Ajoy Kumar Khan
Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Tinku Adhikari
,
Malay Kule
,
Ajoy Kumar Khan
An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface.
ICCCNT
(2022)
Hridoy Jyoti Mahanta
,
Ajoy Kumar Khan
,
Somnath Mukhopadhyay
Resisting HODPA attacks in modular exponentiation using inner product with differential evolution.
Innov. Syst. Softw. Eng.
17 (1) (2021)
Tinku Adhikari
,
Arindam Ghosh
,
Ajoy Kumar Khan
,
Swarnalina Laha
,
Purbita Mitra
,
Raja Karmakar
Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD Protocols.
ICCCNT
(2021)
Amit Kumar Roy
,
Ajoy Kumar Khan
Privacy preservation with RTT-based detection for wireless mesh networks.
IET Inf. Secur.
14 (4) (2020)
Hridoy Jyoti Mahanta
,
Ajoy Kumar Khan
,
Somnath Mukhopadhyay
Modular exponentiation with inner product to resist higher-order DPA attacks.
Innov. Syst. Softw. Eng.
16 (1) (2020)
Hridoy Jyoti Mahanta
,
Ajoy Kumar Khan
A secured modular exponentiation for RSA and CRT-RSA with dual blinding to resist power analysis attacks.
Int. J. Inf. Comput. Secur.
12 (2/3) (2020)
Hridoy Jyoti Mahanta
,
Ajoy Kumar Khan
Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem.
Int. J. Inf. Secur. Priv.
12 (3) (2018)
Hridoy Jyoti Mahanta
,
Ajoy Kumar Khan
Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation.
IET Inf. Secur.
12 (1) (2018)