Somdip Dey
Somdip Dey
School of Computer Science and Electronic Engineering, University of Essex
Verified email at essex.ac.uk - Homepage
Title
Cited by
Cited by
Year
Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm.
S Dey, K Mondal, J Nath, A Nath
International Journal of Modern Education & Computer Science 4 (6), 2012
562012
An Integrated Symmetric Key Cryptographic Method-Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm
S Dey, J Nath, A Nath
International Journal of Modern Education and Computer Science 4 (5), 1, 2012
512012
SD-AEI: An advanced encryption technique for images
S Dey
2012 Second International Conference on Digital Information Processing and …, 2012
472012
Sd-eqr: A new technique to use qr codestm in cryptography
S Dey
arXiv preprint arXiv:1205.4829, 2012
462012
SD-EQR: A New Technique To Use QR CodesTM in Cryptography: Use of QR CodesTM In Data Hiding and Securing
S Dey
International Journal of Information Technology & Computer Science ( IJITCS ), 2012
46*2012
SD-EI: A cryptographic technique to encrypt images
S Dey
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
422012
An advanced combined symmetric key cryptographic method using bit manipulation, bit reversal, modified caesar cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm
S Dey, J Nath, A Nath
International Journal of Computer Applications 46 (20), 46-53, 2012
362012
An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES
S Dey
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (2 …, 2012
342012
Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System
S Dey, S Agarwal, A Nath
2013 IEEE International Conference on Communication Systems and Network …, 2013
332013
Modern encryption standard (mes) version-i: An advanced cryptographic method
S Dey, A Nath
2012 World Congress on Information and Communication Technologies, 242-247, 2012
312012
A Proof of Work: Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory
S Dey
International Journal of Wireless and Microwave Technologies 8 (5), 1-9, 2018
23*2018
SD-ree: A cryptographic method to exclude repetition from a message
S Dey
arXiv preprint arXiv:1205.4832, 2012
232012
Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2
S Dey
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (3 …, 2012
232012
SD-AREE: A new modified caesar cipher cryptographic method along with bit-manipulation to exclude repetition from a message to be encrypted
S Dey
arXiv preprint arXiv:1205.4279, 2012
222012
Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
S Dey
10th Computer Science and Electronic Engineering Conference, 2018
202018
Design and Implementation of a Simple Cache Simulator in Java to Investigate MESI and MOESI Coherency Protocols
S Dey, MS Nair
International Journal of Computer Applications 87 (11), 6-13, 2014
192014
SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message
S Dey
International Journal of Information and Network Security 1 (2), 67, 2012
192012
A New Technique to Hide Encrypted Data in QR Codes TM
AS Dey, BJ Nath, CA Nath
ICOMP'12 - The 2012 International Conference on Internet Computing, 2012
162012
Edge Cooling Mode: An Agent Based Thermal Management Mechanism For DVFS Enabled Heterogeneous MPSoCs
S Dey, E Zaragoza Guajardo, K Reddy Basireddy, X Wang, ...
2019 32nd International Conference on VLSI Design and 2019 18th …, 2019
152019
MAR (S) 2: methodology to articulate the requirements for security In SCADA
T Gopal, M Subbaraju, R vivek Joshi, S Dey
Fourth edition of the International Conference on the Innovative Computing …, 2014
152014
The system can't perform the operation now. Try again later.
Articles 1–20