Login / Signup
Ajoy Kumar Khan
ORCID
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 18
Top Topics
Malicious Nodes
Diffie Hellman
Modular Exponentiation
Power Analysis
Top Venues
Innov. Syst. Softw. Eng.
ICCCNT
Int. J. Inf. Secur. Priv.
IET Inf. Secur.
</>
Publications
</>
Vanlalmuansangi Khenglawt
,
Sahinur Rahman Laskar
,
Partha Pakray
,
Ajoy Kumar Khan
Addressing data scarcity issue for English-Mizo neural machine translation using data augmentation and language model.
J. Intell. Fuzzy Syst.
46 (3) (2024)
Paromita Goswami
,
Neetu Faujdar
,
Ghanshyam Singh
,
Kanta Prasad Sharma
,
Ajoy Kumar Khan
,
Somen Debnath
Stub Signature-Based Efficient Public Data Auditing System Using Dynamic Procedures in Cloud Computing.
IEEE Access
12 (2024)
Paromita Goswami
,
Neetu Faujdar
,
Somen Debnath
,
Ajoy Kumar Khan
,
Ghanshyam Singh
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability.
J. Cloud Comput.
13 (1) (2024)
Abhilash Chakraborty
,
Anupam Biswas
,
Ajoy Kumar Khan
SRIJAN: Secure Randomized Internally Joined Adjustable Network for one-way hashing.
J. Inf. Secur. Appl.
81 (2024)
J. V. N. Raghava Deepthi
,
Ajoy Kumar Khan
,
Tapodhir Acharjee
Multi-level Data Integrity Model with Dual Immutable Digital Key Based Forensic Analysis in IoT Network.
SN Comput. Sci.
5 (1) (2024)
Paromita Goswami
,
Neetu Faujdar
,
Somen Debnath
,
Ajoy Kumar Khan
,
Ghanshyam Singh
ZSS Signature-Based Audit Message Verification Process for Cloud Data Integrity.
IEEE Access
11 (2023)
Abhilash Chakraborty
,
Anupam Biswas
,
Ajoy Kumar Khan
Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation.
CoRR
(2022)
Vanlalmuansangi Khenglawt
,
Sahinur Rahman Laskar
,
Partha Pakray
,
Riyanka Manna
,
Ajoy Kumar Khan
Machine Translation for Low-Resource English-Mizo Pair Encountering Tonal Words.
Computación y Sistemas
26 (3) (2022)
R. Lalduhsaka
,
Nilutpol Bora
,
Ajoy Kumar Khan
Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Tinku Adhikari
,
Malay Kule
,
Ajoy Kumar Khan
An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface.
ICCCNT
(2022)
Hridoy Jyoti Mahanta
,
Ajoy Kumar Khan
,
Somnath Mukhopadhyay
Resisting HODPA attacks in modular exponentiation using inner product with differential evolution.
Innov. Syst. Softw. Eng.
17 (1) (2021)
Tinku Adhikari
,
Arindam Ghosh
,
Ajoy Kumar Khan
,
Swarnalina Laha
,
Purbita Mitra
,
Raja Karmakar
Quantum Resistance for Cryptographic Keys in Classical Cryptosystems: A Study on QKD Protocols.
ICCCNT
(2021)
Amit Kumar Roy
,
Ajoy Kumar Khan
Privacy preservation with RTT-based detection for wireless mesh networks.
IET Inf. Secur.
14 (4) (2020)
Hridoy Jyoti Mahanta
,
Ajoy Kumar Khan
,
Somnath Mukhopadhyay
Modular exponentiation with inner product to resist higher-order DPA attacks.
Innov. Syst. Softw. Eng.
16 (1) (2020)
Hridoy Jyoti Mahanta
,
Ajoy Kumar Khan
A secured modular exponentiation for RSA and CRT-RSA with dual blinding to resist power analysis attacks.
Int. J. Inf. Comput. Secur.
12 (2/3) (2020)
Amit Kumar Roy
,
Ajoy Kumar Khan
,
Hridoy Jyoti Mahanta
Trust-Based Detection of Malicious Nodes for Wireless Mesh Networks.
MIND (2)
(2020)
Hridoy Jyoti Mahanta
,
Ajoy Kumar Khan
Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem.
Int. J. Inf. Secur. Priv.
12 (3) (2018)
Hridoy Jyoti Mahanta
,
Ajoy Kumar Khan
Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation.
IET Inf. Secur.
12 (1) (2018)