RESEARCH PUBLICATIONS

Book Chapters

  1. Kumar Prateek, and S. Maity, "Post Quantum Blockchain Enabled Services in Scalable Smart Cities", in Quantum Blockchain: An Emerging Cryptographic Paradigm, edited by Vani Rajasekar, Rajesh Kumar, SK Hafizul Islam, Balamurugan Balusamy, Ching-Hung Hsu, Scrivener-Wiley, June 2022, pp. 263-291, ISBN-13: 978-1119836223

  2. Manohar Sai Burra and S. Maity, "Characteristics, Advances, and Challenges in Blockchain-Enabled Cyber-Physical Systems" in Blockchain Technology for Emerging Applications: A Comprehensive Approach, edited by S.K. Hafizul Islam, Arup Pal, Debabrata Samanta, Siddhartha Bhattacharyya, Academic Press, April 2022, pp. 67-89, eBook ISBN: 9780323901949, DOI: doi.org/10.1016/B978-0-323-90193-2.00008-9

Journal Publications

  1. Fahiem Altaf and S. Maity, "Beacon Non-Transmission Attack and its Detection in Intelligent Transportation Systems", (Under Review).

  2. Kumar Prateek, S. Maity and Ruhul Amin, "An Unconditionally Secured Privacy-Preserving Authentication Scheme for Smart Metering Infrastructure in Smart Grid", IEEE Transactions on Network Science and Engineering, IEEE. (Under Review)

  3. Kumar Prateek, Neetesh Saxena and S. Maity, "QSKA: A Quantum Secured Privacy-Preserving Mutual Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication", IEEE Transactions on Network and Service Management, IEEE. (Under Review)

  4. Kumar Prateek, N. K. Ojha, F. Altaf and S. Maity, "Quantum Secured 6G Technology Based Applications in Internet of Everything", Telecommunication Systems, Springer. (Under Review)

  5. Kumar Prateek and S. Maity, "Quantum Programming on Azure Quantum - An Open Source Tool for Quantum Developer", Quantum Computing: A Shift from Bits to Qubits, edited by Nidhi Srivastava and Rajiv Pandey, Studies in Computational Intelligence Series, Springer. (Under Review).

  6. Kumar Prateek, Fahiem Altaf, Ruhul Amin and S. Maity, "A Privacy Preserving Authentication Protocol using Quantum Computing for V2I Authentication in Vehicular Ad Hoc Networks", Accepted in Security and Communication Networks (SCN), Hindawi, vol. 2022, Article ID 428061, 17 pages, SCI IF: 1.79 Click here

  7. Manohar Sai Burra and S. Maity, "Certificateless Reliable and Privacy-Preserving Auditing of Group Shared Data for FOG-CPS Systems", Security and Communication Networks (SCN), Hindawi, vol. 2022, Article ID 6705948, 32 pages, SCI IF: 1.79 Click here

  8. Fahiem Altaf and S. Maity, "PLHAS: Privacy-Preserving Localized Hybrid Authentication Scheme for Large Scale Vehicular Ad hoc Networks", Vehicular Communications (VEHCOM), Elsevier, Volume 30 (Aug.2021), No. , pp. 100347, 2021. SCI IF: 6.910 DOI: doi.org/10.1016/j.vehcom.2021.100347 Click here.

  9. S. Maity and R. C. Hansdah, "Security and Performance Analysis of the SEAP Authentication Protocol in MANETs", International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Inderscience, Volume 24, No. 3, pp. 183-203, 2017. SCI IF: 0.654 DOI: doi.org/10.1504/ijahuc.2017.10001127 Click here.

  10. N. Kumar, R. C. Hansdah, S. Maity, "A Design and Classification Framework for Routing Protocols in MANETs", International Journal of Wireless and Mobile Computing (IJWMC), Inderscience, Volume 12, No. 4, pp. 364-383, 2017. Scopus Indexed. DOI: doi.org/10.1504/ijwmc.2017.10006565 Click here.

  11. S. Maity and R. C. Hansdah., "Self-Organized Public Key Management in MANETs with Enhanced Security and without Certificate-Chains", Computer Networks (COMNET), Elsevier, Volume 65, No. 2, pp. 183-211, 2014. SCI IF: 4.474 DOI: doi.org/10.1016/j.comnet.2014.03.016 Click here.

  12. N. B. Bhavesh, S. Maity and R. C. Hansdah, "An Authentication Protocol for Vehicular ad hoc Networks with Heterogeneous Anonymity Requirements", International Journal of Space-Based and Situated Computing (IJSSC), Inderscience, Volume 4, No. 1, pp. 1-14, 2014. ESCI Indexed. Click here.

  13. N. Kumar, S. Maity, R. C. Hansdah and S.Umamaheswaran, "Efficient Destination Discovery Using Geographical Gossiping in MANETs", International Journal on Recent Trends in Engineering & Technology (IJRTET), ACEEE, Vol. 10, No. 1, pp. 83-94, 2014.​ Click here.

Conference Publications

  1. Alok Patel, Kumar Prateek, S. Maity, "A W-Net Based Architecture with Residual Block for Liver Segmentation", Accepted in: 4th International Conference on Inventive Research in Computing Applications (ICIRCA 2022), Coimbatore, India, 21-23, September 2022.

  2. Amit kumar, S. Maity, "Detecting malicious URLs using Lexical Analysis and Network Activities", Accepted in: 4th International Conference on Inventive Research in Computing Applications (ICIRCA 2022), Coimbatore, India, 21-23, September 2022.

  3. Y. Anand , B. Sirmour , Sk. M. Zaman , B. K. Markandey, A. Kumar and S. Maity, "A Brief Survey of Cloud Data Auditing Mechanism", 3rd International Conference on Innovative Data Communication Technologies and Application (ICIDCA-2021), Springer LNDECT Series, vol. 96, pp. 581-593, Coimbatore, Tamil Nadu, India, 20-21 August, 2021. Online ISBN 978-981-16-7167-8, DOI: doi.org/10.1007/978-981-16-7167-8_42

  4. A. Islam, F. Altaf, and S. Maity, "Efficient Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks", 5th International Conference on Inventive Communication and Computational Technologies (ICICCT-2021), Springer LNNS Series, vol 311, pp. 927–942, Namakkal, India, 25-26, June 2021. Online ISBN 978-981-16-5529-6, DOI: doi.org/10.1007/978-981-16-5529-6_70

  5. S. Garg, S. Nayak, A.B. Bavani Sankar and S. Maity, "Applications of Identity-Based Cryptography in Smart Home and Healthcare: A Recent Review", International Conference on Cyber Security in Emerging Digital Era (ICCEDE-20), Springer SCI Series, vol. 1007, pp.227-241, Greater Noida, U.P., India, 9-10 October 2020, Online ISBN 978-981-16-8012-0, DOI: doi.org/10.1007/978-981-16-8012-0_18

  6. A. Islam, S. Ranjan, A. P. Rawat, S. Maity, “A Comprehensive Survey On Attacks and Security Protocols for VANETs”, 8th International Conference on Innovations in Computer Science & Engineering (ICICSE), Springer LNNS Series, vol 171, pp. 583-595, Hyderabad, India, 28-29 August, 2020. Online ISBN 978-981-33-4543-0, DOI: doi.org/10.1007/978-981-33-4543-0_62

  7. M. M. Nawaz, V. Gupta, J. Rawat, K. Prateek, S. Maity, “Partial Consensus and Incremental Learning Based Intrusion Detection System”, International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA), Springer SCI Series, vol 956, pp. 193-201, Goa, India, 29-30th Aug, 2020. Online ISBN 978-3-030-68291-0, DOI: doi.org/10.1007/978-3-030-68291-0_14

  8. P. Kushwaha, H. Sonkar, F. Altaf, S. Maity, “A Brief Survey of Challenge-Response Authentication Mechanisms”, International Conference on ICT for Sustainable Development (ICT4SD), Springer AISC & LNNS Series, vol 154, pp. 573-581, Panaji, Goa, India, 23-24th July, 2020. Online ISBN 978-981-15-8354-4, DOI: doi.org/10.1007/978-981-15-8354-4_57

  9. M. K. Aditia, S. Paida, F. Altaf, S. Maity, “Certificate-less Public Key Encryption For Secure e-Healthcare Systems”, IEEE Conference on Information and Communication Technology, IEEE, pp. 1-5, Allahabad, India, Dec. 6-8, 2019. Online ISBN 978-1-7281-5398-8, DOI: doi.org/10.1109/CICT48419.2019.9066190

  10. Shrishti, M. S. Burra, C. Maurya and S. Maity, “Leakage Resilient Searchable Symmetric Encryption with Periodic Updation”, 3rd International Conference on Trends in Electronics and Informatics (ICOEI-2019), IEEE, pp. 22-29, TamilNadu, India, April 23-25, 2019. Online ISBN 978-1-5386-9439-8, DOI: doi.org/10.1109/ICOEI.2019.8862626

  11. F. Altaf, M. K. Aditia, E. Saini, B. Rakshit and S. Maity, “Privacy-Preserving Lightweight Searchable Encryption for Cloud Assisted e-Health System”, International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2019), IEEE, pp. 310-314, Chennai, India, March 21-23, 2019. Online ISBN 978-1-5386-9279-0, DOI: doi.org/10.1109/WiSPNET45539.2019.9032730

  12. Vasudha, F. Altaf and S. Maity, “Linearly Homomorphic Signature Based Secure Computation Outsourcing in Vehicular Adhoc Networks”, IEEE International Conference on Innovations in Power and Advanced Computing Technologies (i-PACT-2019), IEEE, pp. 1-7, Vellore, India, March 22-23, 2019. Online ISBN 978-1-5386-8190-9, DOI: doi.org/10.1109/i-PACT44901.2019.8959997

  13. R. Dewangan, F. Altaf and S. Maity, “Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET”, 3rd IEEE International Conference on Computing Methodologies and Communication (ICCMC-2019), IEEE, pp. 429-434, TamilNadu, India, March 27-29, 2019. Online ISBN 978-1-5386-7808-4, DOI: doi.org/10.1109/ICCMC.2019.8819737

  14. S. Sultana, F. Altaf, M. K. Aditia, M. Sai Burra, C. Maurya, and S. Maity, “Detection of Beacon Transmission Denial Attack in ITS Using Temporal Auto-correlation and Random Inspections”, 20th International Conference on Distributed Computing and Networking (ICDCN 2019), ACM, pp. 317–326, Bangalore, India, January 4-7, 2019. Online ISBN 978-1-4503-6094-4/19/01, DOI: doi.org/10.1145/3288599.3288616

  15. M. K. Aditia, F. Altaf, M. R. Singh, M. S. Burra, C. Maurya, S. S. Sahoo, and S. Maity, “Optimized CL-PKE with lightweight encryption for resource constrained devices”, 20th International Conference on Distributed Computing and Networking (ICDCN 2019), ACM, pp. 427-432, Bangalore, India, January 4-7, 2019. ISBN 978-1-4503-6094-4/19/01, DOI: doi.org/10.1145/3288599.3296014

  16. S. Maity, K. Sinha and B. P. Sinha, "An Efficient Lightweight Stream Cipher Algorithm for Wireless Networks", IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, San Francisco, CA, USA, March 19-22, 2017. Online ISBN 978-1-5090-4183-1, DOI: doi.org/10.1109/WCNC.2017.7925562

  17. Dania Qara Bala, S. Maity, Sanjay Kumar Jena, "A Lightweight Remote User Authentication Protocol for Smart E-Health Networking Environment", IEEE International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2017), pp. 10-15, Chennai, India, Feb 10-11, 2017. Online ISBN 978-1-5090-3243-3, DOI: doi.org/10.1109/I-SMAC.2017.8058330

  18. Seemran Mishra, S. Maity, Sanjay Kumar Jena, "IBC Based Verifiable Hash Chains For Reliable Internet Access In Intelligent Transportation Systems", IEEE International Conference on Information, Communication & Embeded Systems (ICICES 2017), pp. 1-6, Chennai, India, Feb 23-24, 2017. Online ISBN 978-1-5090-6135-8, DOI: doi.org/10.1109/ICICES.2017.8070749

  19. Vishnu Priyanka Gujjula, S. Maity, Sanjay Kumar Jena, "Privacy Preserving Zone Based Service Provisioning in Intelligent Transportation Systems", IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017), pp. 954-960, Chennai, India, March 22-24, 2017. Online ISBN 978-1-5090-4442-9, DOI: doi.org/10.1109/WiSPNET.2017.8299903

  20. Dania Qara Bala, S. Maity, Sanjay Kumar Jena, "Mutual Authentication for IoT Smart Environment Using Certificate-less Public Key Cryptography", IEEE Third International Conference on Sensing, Signal Processing and Security (ICSSS 2017), pp. 29-34, Chennai, India, May 4-5, 2017. Online ISBN 978-1-5090-4929-5, DOI: doi.org/10.1109/SSPS.2017.8071559

  21. S. H. Talawar, S. Maity and Ramesh C. H., "Secure Routing with an Integrated Localized Key Management Protocol in MANETs", 28th IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 605-612, Victoria, Canada, May 13-16, 2014. Online ISBN 978-1-4799-3630-4, DOI: doi.org/10.1109/AINA.2014.74

  22. S. Maity and Ramesh C. H., "A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs", 9th International Conference on Information Systems Security (ICISS), LNCS, Springer, vol. 8303, pp. 239-246 Kolkata, India, Dec. 16-20, 2013. Online ISBN 978-3-642-45204-8, DOI: doi.org/10.1007/978-3-642-45204-8_18

  23. P. J. Jambhulkar, S. Maity and Ramesh C. H., "A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless Networks", International Symposium on Security in Computing and Communications (SSCC), CCIS, Springer, vol. 377, pp. 138-149, Mysore, India, August 22-24, 2013. Online ISBN 978-3-642-40576-1, DOI: doi.org/10.1007/978-3-642-40576-1_14

  24. N. Kumar, S. Maity and Ramesh C. H., "GeoGossip: A Gossip Based Geographical Routing Protocol for Mobile Ad Hoc Networks", 2nd International Conference on Advances in Computer Science and Application (CSA), ACEEE Conferences Proceedings, Series 01, Elsevier, pp. 640-648, Lucknow, India, June 21-22, 2013. Click here.

  25. S. Maity and Ramesh C. H., "A Secure and Efficient Authentication Protocol (SEAP) for MANETs with Membership Revocation", 27th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 363-370, Barcelona, Spain, March 25-28, 2013. ISBN 978-0-7695-4952-1, DOI: doi.org/10.1109/WAINA.2013.126

  26. N. B. Bhavesh, S. Maity and Ramesh C. H., "A Protocol for Authentication with Multiple Levels of Anonymity (AMLA) in VANETs", 27th IEEE International Conference on Advanced Information Networking and Applications Workshops, pp. 462-469, Barcelona, Spain, March 25-28, 2013. ISBN 978-0-7695-4952-1, DOI: doi.org/10.1109/WAINA.2013.4

  27. S. Maity and Ramesh C. H., "Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs", 8th International Conference on Information Systems Security (ICISS), LNCS, Springer, vol. 7671, pp. 277-293 Guwahati, India, Dec. 15-19, 2012. Online ISBN 978-3-642-35130-3, DOI: doi.org/10.1007/978-3-642-35130-3_20

  28. S. Maity and Ramesh C. H., "Membership Models and the Design of Authentication Protocols for MANETs", 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 544-551, Fukuoka, Japan, March 26-29, 2012. Print ISBN 978-1-4673-0867-0, DOI: doi.org/10.1109/WAINA.2012.107

PhD Thesis

  • S. Maity, "Efficient Key Management, and Intrusion Detection Protocols for Enhancing Security in Mobile Ad Hoc Networks", PhD Thesis, at Indian Institute of Science, Bangalore, India on September 2014. Click here.