An energy complexity model for algorithms S Roy, A Rudra, A Verma Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013 | 101 | 2013 |
Content delivery networks: State of the art, trends, and future roadmap B Zolfaghari, G Srivastava, S Roy, HR Nemati, F Afghah, T Koshiba, ... ACM Computing Surveys (CSUR) 53 (2), 1-34, 2020 | 95 | 2020 |
Multi-robot information gathering for precision agriculture: Current state, scope, and challenges A Dutta, S Roy, OP Kreidl, L Bölöni Ieee Access 9, 161416-161430, 2021 | 48 | 2021 |
Cryptanalysis and improvement of ECC based authentication and key exchanging protocols S Roy, C Khatwani Cryptography 1 (1), 9, 2017 | 33 | 2017 |
Energy efficient merkle trees for blockchains C Castellon, S Roy, P Kreidl, A Dutta, L Bölöni 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021 | 25 | 2021 |
On vulnerability analysis of several password authentication protocols K Garrett, SR Talluri, S Roy Innovations in Systems and Software Engineering 11, 167-176, 2015 | 22 | 2015 |
Energy aware algorithmic engineering S Roy, A Rudra, A Verma 2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014 | 21 | 2014 |
Security analysis of ECC based authentication protocols C Khatwani, S Roy 2015 International conference on computational intelligence and …, 2015 | 19 | 2015 |
Toward a green blockchain: engineering merkle tree and proof of work for energy optimization CC Escobar, S Roy, OP Kreidl, A Dutta, L Bölöni IEEE Transactions on Network and Service Management 19 (4), 3847-3857, 2022 | 18 | 2022 |
Highly efficient computationally derived novel metagenome α-amylase with robust stability under extreme denaturing conditions S Ariaeenejad, B Zolfaghari, SF Sadeghian Motahar, K Kavousi, M Maleki, ... Frontiers in Microbiology 12, 713125, 2021 | 15 | 2021 |
Automated optimal dispatching of service requests A Verma, NV Desai, A Bhamidipaty, AN Jain, J Nallacherry, S Roy, ... 2011 Annual SRII Global Conference, 426-429, 2011 | 15 | 2011 |
Cache attacks on blockchain based information centric networks: an experimental evaluation S Roy, FJA Morais, M Salimitari, M Chatterjee Proceedings of the 20th International Conference on Distributed Computing …, 2019 | 13 | 2019 |
Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication S Roy, AK Das, Y Li 30th IEEE International Performance Computing and Communications Conference, 1-7, 2011 | 13 | 2011 |
On the scalability and effectiveness of a cache pollution based DoS attack in information centric networks J Gouge, A Seetharam, S Roy 2016 International Conference on Computing, Networking and Communications …, 2016 | 12 | 2016 |
Secure multi-robot adaptive information sampling T Samman, J Spearman, A Dutta, OP Kreidl, S Roy, L Bölöni 2021 IEEE International Symposium on Safety, Security, and Rescue Robotics …, 2021 | 11 | 2021 |
Denial of service attack on protocols for smart grid communications S Roy Research Anthology on Combating Denial-of-Service Attacks, 560-578, 2021 | 11 | 2021 |
Towards an energy-efficient hash-based message authentication code (HMAC) CE Castellon, S Roy, OP Kreidl, A Dutta, L Bölöni 2022 IEEE 13th International Green and Sustainable Computing Conference …, 2022 | 10 | 2022 |
Attacks and vulnerability analysis of e-mail as a password reset point C Routh, B DeCrescenzo, S Roy 2018 Fourth International Conference on Mobile and Secure Services …, 2018 | 9 | 2018 |
Multi-robot information sampling using deep mean field reinforcement learning T Said, J Wolbert, S Khodadadeh, A Dutta, OP Kreidl, L Bölöni, S Roy 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2021 | 8 | 2021 |
Block sorting is apx-hard NS Narayanaswamy, S Roy International Conference on Algorithms and Complexity, 377-389, 2015 | 8 | 2015 |