default search action
Bimal K. Roy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j24]Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, Feng Hao:
On the feasibility of E2E verifiable online voting - A case study from Durga Puja trial. J. Inf. Secur. Appl. 81: 103719 (2024) - 2023
- [j23]Subhra Mazumdar, Prabal Banerjee, Abhinandan Sinha, Sushmita Ruj, Bimal Kumar Roy:
Strategic Analysis of Griefing Attack in Lightning Network. IEEE Trans. Netw. Serv. Manag. 20(2): 1790-1803 (2023) - 2021
- [j22]Somnath Panja, Bimal Roy:
A secure end-to-end verifiable e-voting system using blockchain and cloud server. J. Inf. Secur. Appl. 59: 102815 (2021) - 2020
- [j21]Somnath Panja, Samiran Bag, Feng Hao, Bimal Kumar Roy:
A Smart Contract System for Decentralized Borda Count Voting. IEEE Trans. Engineering Management 67(4): 1323-1339 (2020) - 2015
- [j20]Mrinal Nandi, Amiya Nayak, Bimal K. Roy, Santanu Sarkar:
Hypothesis testing and decision theoretic approach for fault detection in wireless sensor networks. Int. J. Parallel Emergent Distributed Syst. 30(4): 262-285 (2015) - [j19]Vignesh T. Subrahmaniam, Anup Dewanji, Bimal K. Roy:
A Semiparametric Software Reliability Model for Analysis of a Bug-Database With Multiple Defect Types. Technometrics 57(4): 576-585 (2015) - 2014
- [j18]Mrinal Nandi, Anup Dewanji, Bimal K. Roy, Santanu Sarkar:
Model Selection Approach for Distributed Fault Detection in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - 2013
- [j17]Samiran Bag, Bimal K. Roy:
A new key predistribution scheme for general and grid-group deployment of wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013: 145 (2013) - 2012
- [j16]Srimanta Bhattacharya, Sushmita Ruj, Bimal K. Roy:
Combinatorial batch codes: A lower bound and optimal constructions. Adv. Math. Commun. 6(2): 165-174 (2012) - 2011
- [j15]Sushmita Ruj, Bimal K. Roy:
Key pre-distribution using partially balanced designs in wireless sensor networks. Int. J. High Perform. Comput. Netw. 7(1): 19-28 (2011) - [j14]Subba Rao V. Yengisetty, Bimal K. Roy:
Applications of visual cryptography. Int. J. Parallel Emergent Distributed Syst. 26(5): 429-442 (2011) - 2009
- [j13]Sushmita Ruj, Bimal K. Roy:
Revisiting Key Predistribution using Transversal Designs for a Grid-based Deployment Scheme. Int. J. Distributed Sens. Networks 5(6): 660-674 (2009) - [j12]Sushmita Ruj, Bimal K. Roy:
Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACM Trans. Sens. Networks 6(1): 4:1-4:28 (2009) - 2008
- [j11]Sushmita Ruj, Subhamoy Maitra, Bimal K. Roy:
Key Predistribution Using Transversal Design on a Grid of Wireless Sensor Network. Ad Hoc Sens. Wirel. Networks 5(3-4): 247-264 (2008) - 2007
- [j10]Avishek Adhikari, Mausumi Bose, Dewesh Kumar, Bimal K. Roy:
Applications of Partially Balanced Incomplete Block Designs in Developing (2, n) Visual Cryptographic Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(5): 949-951 (2007) - 2006
- [j9]Bimal Kumar Roy, A. R. Rao, Dwijendra K. Ray-Chaudhuri:
Foreword. Discret. Math. 306(14): 1463 (2006) - [j8]Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. Int. J. Inf. Sec. 5(2): 105-114 (2006) - 2005
- [j7]Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:
Clique Size in Sensor Networks with Key Pre-distribution Based on Transversal Design. Int. J. Distributed Sens. Networks 1(3&4): 345-354 (2005) - 2004
- [j6]Soumen Maity, Amiya Nayak, Bimal K. Roy:
On characterization of catastrophic faults in two-dimensional VLSI arrays. Integr. 38(2): 267-281 (2004) - [j5]Soumen Maity, Amiya Nayak, Bimal K. Roy:
Characterization of catastrophic faults in two-dimensional reconfigurable systolic arrays with unidirectional links. Inf. Process. Lett. 92(4): 189-197 (2004) - 2003
- [j4]Dwijendra K. Ray-Chaudhuri, A. R. Rao, Bimal Kumar Roy:
Preface: Volume 15. Electron. Notes Discret. Math. 15: 1 (2003) - 2002
- [j3]Soumen Maity, Bimal K. Roy, Amiya Nayak:
On enumeration of catastrophic fault patterns. Inf. Process. Lett. 81(4): 209-212 (2002) - 2001
- [j2]Soumen Maity, Bimal K. Roy, Amiya Nayak:
Enumerating catastrophic fault patterns in VLSI arrays with both uni- and bidirectional links. Integr. 30(2): 157-168 (2001) - 1997
- [j1]Tridib Kumar Dutta, Bimal K. Roy:
Construction of Symmetric Balanced Squares. Ars Comb. 47 (1997)
Conference and Workshop Papers
- 2021
- [c18]Diptendu Chatterjee, Bimal Kumar Roy:
An Improved Scheduling Algorithm for Traveling Tournament Problem with Maximum Trip Length Two. ATMOS 2021: 16:1-16:15 - 2013
- [c17]Samiran Bag, Sushmita Ruj, Bimal K. Roy:
Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach. ICISS 2013: 43-62 - [c16]Samiran Bag, Bimal K. Roy:
Two channel hopping schemes for jamming resistant wireless communication. WiMob 2013: 659-666 - 2009
- [c15]Sushmita Ruj, Jennifer Seberry, Bimal K. Roy:
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks. CSE (2) 2009: 873-878 - 2008
- [c14]Sushmita Ruj, Bimal K. Roy:
Key Predistribution Schemes Using Codes in Wireless Sensor Networks. Inscrypt 2008: 275-288 - [c13]Abhijit Das, Bimal K. Roy:
A New Key-Predistribution Scheme for Highly Mobile Sensor Networks. ICDCN 2008: 298-303 - [c12]Sushmita Ruj, Bimal K. Roy:
Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes. WOSIS 2008: 68-77 - 2007
- [c11]Sushmita Ruj, Bimal K. Roy:
Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks. ISPA 2007: 431-445 - 2005
- [c10]Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:
A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks. ICISS 2005: 228-238 - [c9]Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:
A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. ISC 2005: 89-103 - [c8]Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:
Clique Size in Sensor Networks with Key Pre-distribution Based on Transversal Design. IWDC 2005: 329-337 - 2004
- [c7]Avishek Adhikari, Tridib Kumar Dutta, Bimal K. Roy:
A New Black and White Visual Cryptographic Scheme for General Access Structures. INDOCRYPT 2004: 399-413 - [c6]Soumen Maity, Amiya Nayak, Bimal K. Roy:
Reliability of VLSI Linear Arrays with Redundant Links. IWDC 2004: 326-337 - 2003
- [c5]Sarbani Palit, Bimal K. Roy, Arindom De:
A Fast Correlation Attack for LFSR-Based Stream Ciphers. ACNS 2003: 331-342 - 2002
- [c4]Bimal K. Roy:
A Brief Outline of Research on Correlation Immune Functions. ACISP 2002: 379-394 - [c3]Bimal K. Roy:
Summarising recent results on finding multiples of primitive polynomials over GF(2). ITW 2002: 82-85 - 1999
- [c2]Sarbani Palit, Bimal K. Roy:
Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function. ASIACRYPT 1999: 306-320 - 1997
- [c1]Palash Sarkar, Bimal K. Roy, Pabitra Pal Choudhury:
VLSI Implementation of Modulo Multiplication Using Carry Free Addition. VLSI Design 1997: 457-460
Editorship
- 2009
- [e4]Bimal K. Roy, Nicolas Sendrier:
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings. Lecture Notes in Computer Science 5922, Springer 2009, ISBN 978-3-642-10627-9 [contents] - 2005
- [e3]Bimal K. Roy:
Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings. Lecture Notes in Computer Science 3788, Springer 2005, ISBN 3-540-30684-6 [contents] - 2004
- [e2]Bimal K. Roy, Willi Meier:
Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers. Lecture Notes in Computer Science 3017, Springer 2004, ISBN 3-540-22171-9 [contents] - 2000
- [e1]Bimal K. Roy, Eiji Okamoto:
Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings. Lecture Notes in Computer Science 1977, Springer 2000, ISBN 3-540-41452-5 [contents]
Informal and Other Publications
- 2024
- [i10]Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar:
Access Structure Hiding Verifiable Tensor Designs. IACR Cryptol. ePrint Arch. 2024: 902 (2024) - 2023
- [i9]Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, Feng Hao:
On the Feasibility of E2E Verifiable Online Voting - A Case Study From Durga Puja Trial. IACR Cryptol. ePrint Arch. 2023: 1770 (2023) - 2022
- [i8]Subhra Mazumdar, Prabal Banerjee, Abhinandan Sinha, Sushmita Ruj, Bimal Roy:
Strategic Analysis to defend against Griefing Attack in Lightning Network. CoRR abs/2203.10533 (2022) - 2021
- [i7]Diptendu Chatterjee, Bimal Kumar Roy:
An Improved Scheduling Algorithm for Traveling Tournament Problem with Maximum Trip Length Two. CoRR abs/2109.09065 (2021) - 2018
- [i6]Somnath Panja, Bimal Kumar Roy:
A secure end-to-end verifiable e-voting system using zero knowledge based blockchain. IACR Cryptol. ePrint Arch. 2018: 466 (2018) - 2013
- [i5]Mrinal Nandi, Anup Dewanji, Bimal K. Roy, Santanu Sarkar:
Model Selection Approach for Distributed Fault Detection in Wireless Sensor Networks. CoRR abs/1301.4795 (2013) - [i4]Sanchita Barman, Bimal Roy:
Method to secure data in the cloud while preserving summary statistics. IACR Cryptol. ePrint Arch. 2013: 714 (2013) - 2012
- [i3]Mrinal Nandi, Amiya Nayak, Bimal K. Roy, Santanu Sarkar:
Hypothesis Testing and Decision Theoretic Approach for Fault Detection in Wireless Sensor Networks. CoRR abs/1203.0541 (2012) - 2011
- [i2]Srimanta Bhattacharya, Sushmita Ruj, Bimal K. Roy:
Combinatorial Batch Codes: A Lower Bound and Optimal Constructions. CoRR abs/1102.4951 (2011) - 2008
- [i1]Sushmita Ruj, Bimal K. Roy:
More on Combinatorial Batch Codes. CoRR abs/0809.3357 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-02 20:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint