The SCEAS System
Navigation Menu

Search the dblp DataBase


Sukumar Nandi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Somanath Tripathy, Sukumar Nandi, Atanu Roy Chowdhury
    CARMA: Cellular Automata Based Remote Mutual Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:190-191 [Conf]
  2. Vinod Kone, Sukumar Nandi
    QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:40-45 [Conf]
  3. Somanath Tripathy, Atanu Roy Chowdhury, Sukumar Nandi
    CARA: Cellular automata based remote-user authentication scheme. [Citation Graph (0, 0)][DBLP]
    COMSWARE, 2006, pp:- [Conf]
  4. Suresh Reddy, Sukumar Nandi
    Modular approach for anomaly based NIDS. [Citation Graph (0, 0)][DBLP]
    COMSWARE, 2006, pp:- [Conf]
  5. Zhuowei Li, Amitabha Das, Sukumar Nandi
    Utilizing Statistical Characteristics of N-grams for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CW, 2003, pp:486-493 [Conf]
  6. Suresh Reddy, Sukumar Nandi
    Enhanced Network Traffic Anomaly Detector. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:397-403 [Conf]
  7. Somanath Tripathy, Sukumar Nandi
    Efficient Remote User Authentication and Key Establishment for Multi-server Environment. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2006, pp:333-346 [Conf]
  8. Vivek Ramachandran, Sukumar Nandi
    Detecting ARP Spoofing: An Active Technique. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:239-250 [Conf]
  9. Zhifei Li, Sukumar Nandi, Anil K. Gupta
    Achieving MAC fairness in wireless ad-hoc networks using adaptive transmission control. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:176-181 [Conf]
  10. Zhifei Li, Sukumar Nandi, Anil K. Gupta
    Improving MAC Performance in Wireless Ad Hoc Networks Using Enhanced Carrier Sensing (ECS). [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:600-612 [Conf]
  11. Zhifei Li, Sukumar Nandi, Anil K. Gupta
    Modeling the Short-Term Unfairness of IEEE 802.11 in Presence of Hidden Terminals. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:613-625 [Conf]
  12. Biswanath Dey, Sukumar Nandi
    Distributed Location and Lifetime Biased Clustering for Large Scale Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICDCN, 2006, pp:534-545 [Conf]
  13. Zhifei Li, Sukumar Nandi, Anil K. Gupta
    ECS: An enhanced carrier sensing mechanism for wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:17, pp:1970-1984 [Journal]
  14. Zhifei Li, Sukumar Nandi, Anil K. Gupta
    Modeling the short-term unfairness of IEEE 802.11 in presence of hidden terminals. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2006, v:63, n:4-5, pp:441-462 [Journal]

  15. Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection. [Citation Graph (, )][DBLP]

  16. OSASMAC: Opportunistic Secure Adaptive Sensor MAC Protocol. [Citation Graph (, )][DBLP]

  17. Securing Wireless Sensor Networks Against Spurious Injections. [Citation Graph (, )][DBLP]

  18. Improving MAC Layer Fairness in Multi-Hop 802.11 Networks. [Citation Graph (, )][DBLP]

  19. A Strict Priority Based QoS-Aware MAC Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  20. Seamless Handoff between IEEE 802.11 and GPRS Networks. [Citation Graph (, )][DBLP]

  21. Enhancing Route Recovery for QAODV Routing in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  22. A Zone Based Interleaved Scanning Technique for Fast Handoff in IEEE 802.11 Wireless Networks. [Citation Graph (, )][DBLP]

  23. Sahnet: a secure system for ad-hoc networking using ecc. [Citation Graph (, )][DBLP]

  24. A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks. [Citation Graph (, )][DBLP]

  25. Distance Based Fast Hierarchical Clustering Method for Large Datasets. [Citation Graph (, )][DBLP]

  26. Fast Single-Link Clustering Method Based on Tolerance Rough Set Model. [Citation Graph (, )][DBLP]

  27. QDMAC: An Energy Efficient Low Latency MAC Protocol for Query Based Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  28. An Active Intrusion Detection System for LAN Specific Attacks. [Citation Graph (, )][DBLP]

  29. A dynamic balanced-energy sleep scheduling scheme in heterogeneous wireless sensor network. [Citation Graph (, )][DBLP]

  30. Defense against outside attacks in wireless sensor networks. [Citation Graph (, )][DBLP]

Search in 0.404secs, Finished in 0.405secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002