Bhuyan, Bubu
18  results:
Search for persons X
?
1

Quantum-Resistant Hash-Based Digital Signature Schemes: A R..:

, In: Proceedings of 4th International Conference on Frontiers in Computing and Systems; Lecture Notes in Networks and Systems,
Panthi, Swarna ; Bhuyan, Bubu - p. 637-655 , 2024
 
?
2

Comparative Analysis and Performance Metrics Evaluation of ..:

, In: 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT),
Jamatia, Rupa ; Bhuyan, Bubu - p. 1-7 , 2023
 
?
3

NMRMG: Nonlinear Multiple-Recursive Matrix Generator Design..:

Deb, Subhrajyoti ; Pal, Santu ; Bhuyan, Bubu
Wireless Personal Communications.  125 (2022)  1 - p. 577-597 , 2022
 
?
4

Using Game Theory to Defend Elastic and Inelastic Services ..:

, In: Lecture Notes in Networks and Systems; Proceedings of International Conference on Frontiers in Computing and Systems,
Kumar, Bhupender ; Bhuyan, Bubu - p. 371-382 , 2022
 
?
5

Game Theoretical Defense Mechanism Against Bandwidth Based ..:

, In: Proceedings of the International Conference on Computing and Communication Systems; Lecture Notes in Networks and Systems,
Kumar, Bhupender ; Bhuyan, Bubu - p. 601-613 , 2021
 
?
6

Chaos-based medical image encryption scheme using special n..:

Deb, Subhrajyoti ; Bhuyan, Bubu
Multimedia Tools and Applications.  80 (2021)  13 - p. 19803-19826 , 2021
 
?
8

An Efficient Computation and Storage Outsourcing Process wi..:

, In: Learning and Analytics in Intelligent Systems; Intelligent Techniques and Applications in Science and Technology,
Debnath, Somen ; Bhuyan, Bubu - p. 94-103 , 2020
 
?
 
?
10

Study and Scope of Signcryption for Cloud Data Access Contr..:

, In: Advances in Computer, Communication and Control; Lecture Notes in Networks and Systems,
 
?
12

Secure image encryption scheme using high efficiency word-o..:

Deb, Subhrajyoti ; Biswas, Bhaskar ; Bhuyan, Bubu
Multimedia Tools and Applications.  78 (2019)  24 - p. 34901-34925 , 2019
 
?
13

Advanced Image Encryption Scheme Using Snow Stream Cipher:

, In: Lecture Notes in Electrical Engineering; Emerging Trends in Electrical, Communications, and Information Technologies,
 
1-15