Follow
Sandip Dutta
Title
Cited by
Cited by
Year
A survey on implementation of lightweight block ciphers for resource constraints devices
Nayancy, S Dutta, S Chakraborty
Journal of Discrete Mathematical Sciences and Cryptography 25 (5), 1377-1398, 2022
262022
Network security using biometric and cryptography
S Dutta, A Kar, NC Mahanti, BN Chatterji
Advanced Concepts for Intelligent Vision Systems: 10th International …, 2008
262008
Regression test case prioritization technique using genetic algorithm
DK Yadav, S Dutta
Advances in Computational Intelligence: Proceedings of International …, 2017
252017
Test case prioritization technique based on early fault detection using fuzzy logic
DK Yadav, S Dutta
2016 3rd international conference on computing for sustainable global …, 2016
252016
A Symmetric Key Algorithm for Cryptography using Music
SC Sandip Dutta , Chandan Kumar
International Journal of Engineering and Technology (IJET) 5, 3109-3115, 2013
25*2013
A hybrid polybius-playfair music cipher
C Kumar, S Dutta, S Chakraborty
International Journal of Multimedia and Ubiquitous Engineering 10 (8), 187-198, 2015
222015
Regression test case selection and prioritization for object oriented software
DK Yadav, S Dutta
Microsystem Technologies 26 (5), 1463-1477, 2020
202020
Hiding messages using musical notes: A fuzzy logic approach
C Kumar, S Dutta, S Chakraborty
International Journal of Security and Its Applications 9 (1), 237-248, 2015
172015
Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach
S Ray, KN Mishra, S Dutta
International Journal of Information Technology 14 (3), 1333-1341, 2022
132022
Big data security issues from the perspective of IoT and cloud computing: A review
S Ray, KN Mishra, S Dutta
Recent Advances in Computer Science and Communications 12 (1), 1-22, 2020
122020
Musical cryptography using genetic algorithm
C Kumar, S Dutta, S Chakborty
2014 International Conference on Circuits, Power and Computing Technologies …, 2014
122014
A Novel Method of Hiding Message Using Musical
S Dutta, S Chakraborty, NC Mahanti
International Journal of Computer Applications 975, 8887, 2010
122010
Empirical and statistical comparison of intermediate steps of AES-128 and RSA in terms of time consumption
P Pranav, S Dutta, S Chakraborty
Soft Computing 25 (21), 13127-13145, 2021
92021
Test case prioritization using clustering approach for object oriented software
DK Yadav, SK Dutta
International Journal of Information System Modeling and Design (IJISMD) 10 …, 2019
92019
Test case prioritization based on early fault detection technique
DK Yadav, S Dutta
Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021
62021
Survey on lightweight cryptography algorithm for data privacy in internet of things
M Sinha, S Dutta
Proceedings of the Fourth International Conference on Microelectronics …, 2021
62021
A new cipher system using semi-natural composition in Indian raga
P Pranav, S Chakraborty, S Dutta
Soft Computing 24 (2), 1529-1537, 2020
62020
Fingerprint based cryptography technique for improved network security
S Dutta, S Chakraborty, NC Mahanti
Journal of Computer Science and Engineering 5 (2), 11-18, 2011
62011
Sensitive data identification and security assurance in cloud and IoT based networks
S Ray, KN Mishra, S Dutta
Int J Comput Netw Inf Secur 13, 1-25, 2021
52021
IoT-Based Secure Communication to Enhance Blockchain Model
Nayancy, S Dutta, S Chakraborty
Proceedings of the Fourth International Conference on Microelectronics …, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20