default search action
Samiran Bag
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Luke Harrison, Samiran Bag, Feng Hao:
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities. AsiaCCS 2024 - 2023
- [i4]Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot:
Owl: An Augmented Password-Authenticated Key Exchange Scheme. IACR Cryptol. ePrint Arch. 2023: 768 (2023) - [i3]Luke Harrison, Samiran Bag, Feng Hao:
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities. IACR Cryptol. ePrint Arch. 2023: 1920 (2023) - 2022
- [j17]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
End-to-end verifiable cumulative voting without tallying authorities. Int. J. Appl. Cryptogr. 4(2): 85-103 (2022) - [c15]Luke Harrison, Samiran Bag, Hang Luo, Feng Hao:
VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities. AsiaCCS 2022: 1113-1125 - [c14]Samiran Bag, Indranil Ghosh Ray, Feng Hao:
A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search. SECRYPT 2022: 366-373 - 2021
- [j16]Muhammad Ajmal Azad, Samiran Bag, Farhan Ahmad, Feng Hao:
Sharing is Caring: A collaborative framework for sharing security alerts. Comput. Commun. 165: 75-84 (2021) - [j15]Muhammad Ajmal Azad, Charith Perera, Samiran Bag, Mahmoud Barhamgi, Feng Hao:
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks. ACM Trans. Cyber Phys. Syst. 5(1): 4:1-4:24 (2021) - 2020
- [j14]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting. IEEE Secur. Priv. 18(6): 6-13 (2020) - [j13]Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Andrii Shalaginov:
Decentralized Self-Enforcing Trust Management System for Social Internet of Things. IEEE Internet Things J. 7(4): 2690-2703 (2020) - [j12]Somnath Panja, Samiran Bag, Feng Hao, Bimal Kumar Roy:
A Smart Contract System for Decentralized Borda Count Voting. IEEE Trans. Engineering Management 67(4): 1323-1339 (2020) - [j11]Muhammad Ajmal Azad, Samiran Bag, Shazia Tabassum, Feng Hao:
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams. IEEE Trans. Emerg. Top. Comput. 8(2): 313-327 (2020) - [j10]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IEEE Trans. Inf. Forensics Secur. 15: 2042-2052 (2020) - [j9]Muhammad Ajmal Azad, Samiran Bag, Charith Perera, Mahmoud Barhamgi, Feng Hao:
Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network. IEEE Trans. Ind. Informatics 16(5): 3606-3615 (2020) - [i2]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. IACR Cryptol. ePrint Arch. 2020: 650 (2020)
2010 – 2019
- 2019
- [j8]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
PriVeto: a fully private two-round veto protocol. IET Inf. Secur. 13(4): 311-320 (2019) - [j7]Muhammad Ajmal Azad, Samiran Bag, Simon Parkinson, Feng Hao:
TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks. IEEE Internet Things J. 6(4): 5878-5891 (2019) - [c13]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
E2E Verifiable Borda Count Voting System without Tallying Authorities. ARES 2019: 11:1-11:9 - [c12]Samiran Bag, Feng Hao:
E2E Verifiable Electronic Voting System for Shareholders. DSC 2019: 1-8 - [i1]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IACR Cryptol. ePrint Arch. 2019: 1332 (2019) - 2018
- [j6]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
A privacy-aware decentralized and personalized reputation system. Comput. Secur. 77: 514-530 (2018) - [j5]Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Khaled Salah:
M2M-REP: Reputation system for machines in the internet of things. Comput. Secur. 79: 1-16 (2018) - [j4]Muhammad Ajmal Azad, Samiran Bag, Feng Hao:
PrivBox: Verifiable decentralized reputation system for online marketplaces. Future Gener. Comput. Syst. 89: 44-57 (2018) - [c11]Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai:
Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. Inscrypt 2018: 101-114 - 2017
- [j3]Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Trans. Inf. Forensics Secur. 12(8): 1967-1978 (2017) - [c10]Muhammad Ajmal Azad, Samiran Bag, Feng Hao:
M2M-REP: Reputation of Machines in the Internet of Things. ARES 2017: 28:1-28:7 - [c9]Muhammad Ajmal Azad, Samiran Bag:
Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network. SAC 2017: 1711-1717 - 2016
- [c8]Binanda Sengupta, Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Retricoin: Bitcoin based on compact proofs of retrievability. ICDCN 2016: 14:1-14:10 - [c7]Samiran Bag, Kouichi Sakurai:
Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools. ISC 2016: 167-180 - 2015
- [j2]Samiran Bag:
A New Key Predistribution Scheme for Grid-Group Deployment of Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 27(3-4): 313-329 (2015) - [c6]Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies. Inscrypt 2015: 260-279 - 2013
- [j1]Samiran Bag, Bimal K. Roy:
A new key predistribution scheme for general and grid-group deployment of wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013: 145 (2013) - [c5]Samiran Bag, Sushmita Ruj, Bimal K. Roy:
Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach. ICISS 2013: 43-62 - [c4]Samiran Bag, Bimal K. Roy:
Two channel hopping schemes for jamming resistant wireless communication. WiMob 2013: 659-666 - 2012
- [c3]Samiran Bag, Aritra Dhar, Pinaki Sarkar:
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks. ISC 2012: 136-150 - 2011
- [c2]Samiran Bag, Sushmita Ruj:
Key Distribution in Wireless Sensor Networks Using Finite Affine Plane. AINA Workshops 2011: 436-441 - [c1]Samiran Bag, Amrita Saha, Pinaki Sarkar:
Highly Resilient Communication Using Affine Planes for Key Predistribution and Reed Muller Codes for Connectivity in Wireless Sensor Network. WiMo/CoNeCo 2011: 83-94
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint