עקוב אחר
Mohona Ghosh
Mohona Ghosh
Assistant Professor, Indira Gandhi Delhi Technical University for Women
כתובת אימייל מאומתת בדומיין igdtuw.ac.in
כותרת
צוטט על ידי
צוטט על ידי
שנה
Security analysis of SKINNY under related-tweakey settings
G Liu, M Ghosh, L Song
Cryptology ePrint Archive, 2016
782016
FbHash: A new similarity hashing scheme for digital forensics
D Chang, M Ghosh, SK Sanadhya, M Singh, DR White
Digital Investigation 29, S113-S123, 2019
332019
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Information Security and Cryptology-ICISC 2014: 17th International …, 2015
292015
BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level
D Chang, S Garg, M Ghosh, M Hasan
Information Sciences 546, 481-511, 2021
282021
The paper slip should be there! Perceptions of transaction receipts in branchless banking
S Panjwani, M Ghosh, P Kumaraguru, SV Singh
Proceedings of the 15th international conference on Human-computer …, 2013
222013
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms
D Chang, M Ghosh, KC Gupta, A Jati, A Kumar, D Moon, IG Ray, ...
Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017
102017
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256
Akshima, D Chang, M Ghosh, A Goel, SK Sanadhya
International Conference on Cryptology in India, 198-217, 2015
102015
Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512
Akshima, D Chang, M Ghosh, A Goel, SK Sanadhya
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
82016
A study on characterizing the ecosystem of monetizing video spams on youtube platform
A Tripathi, KK Bharti, M Ghosh
Proceedings of the 21st International Conference on Information Integration …, 2019
72019
Analyzing the uncharted territory of monetizing scam Videos on YouTube
A Tripathi, M Ghosh, K Bharti
Social Network Analysis and Mining 12 (1), 119, 2022
62022
Bicliques with Minimal Data and Time Complexity for AES (extended version)
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Cryptology ePrint Archive, 2014
52014
A fusion of binary grey wolf optimization algorithm with opposition and weighted positioning for feature selection
A Tripathi, KK Bharti, M Ghosh
International Journal of Information Technology 15 (8), 4469-4479, 2023
42023
A novel two-level secure access control approach for blockchain platform in healthcare
S Mittal, M Ghosh
International Journal of Information Security 22 (4), 799-817, 2023
42023
FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm
M Singh, A Khunteta, M Ghosh, D Chang, SK Sanadhya
Forensic Science International: Digital Investigation 41, 301375, 2022
42022
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
D Chang, M Ghosh, A Jati, A Kumar, SK Sanadhya
Security, Privacy, and Applied Cryptography Engineering: 7th International …, 2017
42017
Biclique Cryptanalysis of full round AES-128 based hashing modes
D Chang, M Ghosh, SK Sanadhya
Information Security and Cryptology: 11th International Conference, Inscrypt …, 2016
42016
Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique
M Agrawal, D Chang, M Ghosh, SK Sanadhya
International Conference on Information Security and Cryptology, 343-360, 2014
32014
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication
S Mittal, M Ghosh
The Journal of Supercomputing 80 (6), 7955-7992, 2024
22024
A Lightweight Blockchain Framework for secure transaction in resource constrained IoT devices
R Raj, M Ghosh
2023 5th International Conference on Recent Advances in Information …, 2023
22023
Efficient and effective static android malware detection using machine learning
V Bansal, M Ghosh, N Baliyan
International conference on information systems security, 103-118, 2022
22022
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20