Somdip Dey
Title
Cited by
Cited by
Year
Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm.
S Dey, K Mondal, J Nath, A Nath
International Journal of Modern Education & Computer Science 4 (6), 2012
602012
An Integrated Symmetric Key Cryptographic Method-Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm.
S Dey, J Nath, A Nath
International Journal of Modern Education & Computer Science 4 (5), 2012
542012
SD-AEI: An advanced encryption technique for images
S Dey
2012 Second International Conference on Digital Information Processing and …, 2012
502012
Sd-eqr: A new technique to use qr codestm in cryptography
S Dey
arXiv preprint arXiv:1205.4829, 2012
492012
SD-EQR: A New Technique To Use QR CodesTM in Cryptography: Use of QR CodesTM In Data Hiding and Securing
S Dey
International Journal of Information Technology & Computer Science ( IJITCS ), 2012
49*2012
SD-EI: A cryptographic technique to encrypt images
S Dey
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
452012
An advanced combined symmetric key cryptographic method using bit manipulation, bit reversal, modified caesar cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm
S Dey, J Nath, A Nath
International Journal of Computer Applications 46 (20), 46-53, 2012
402012
An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES
S Dey
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (2 …, 2012
362012
Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
S Dey
10th Computer Science and Electronic Engineering Conference, 2018
352018
Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System
S Dey, S Agarwal, A Nath
2013 IEEE International Conference on Communication Systems and Network …, 2013
352013
Modern encryption standard (mes) version-i: An advanced cryptographic method
S Dey, A Nath
2012 World Congress on Information and Communication Technologies, 242-247, 2012
332012
A Proof of Work: Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory
S Dey
International Journal of Wireless and Microwave Technologies 8 (5), 1-9, 2018
32*2018
SD-ree: A cryptographic method to exclude repetition from a message
S Dey
arXiv preprint arXiv:1205.4832, 2012
262012
SD-AREE: A new modified caesar cipher cryptographic method along with bit-manipulation to exclude repetition from a message to be encrypted
S Dey
arXiv preprint arXiv:1205.4279, 2012
252012
Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2
S Dey
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (3 …, 2012
252012
Design and Implementation of a Simple Cache Simulator in Java to Investigate MESI and MOESI Coherency Protocols
S Dey, MS Nair
International Journal of Computer Applications 87 (11), 6-13, 2014
212014
Edge Cooling Mode: An Agent Based Thermal Management Mechanism For DVFS Enabled Heterogeneous MPSoCs
S Dey, E Zaragoza Guajardo, K Reddy Basireddy, X Wang, ...
2019 32nd International Conference on VLSI Design and 2019 18th …, 2019
202019
SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message
S Dey
International Journal of Information and Network Security 1 (2), 67, 2012
202012
A colour image encryption based on DNA coding and chaotic sequences
S Som, A Kotal, A Chatterjee, S Dey, S Palit
2013 1st International Conference on Emerging Trends and Applications in …, 2013
172013
A New Technique to Hide Encrypted Data in QR Codes TM
AS Dey, BJ Nath, CA Nath
ICOMP'12 - The 2012 International Conference on Internet Computing, 2012
172012
The system can't perform the operation now. Try again later.
Articles 1–20