What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Biplab Sikdar
Google Scholar
ORCID:
0000-0002-0084-4647
16
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
PGUS: Pretty Good User Security for Thick MVNOs with a Novel Sanitizable Blind Signature.
Yang Yang
Quan Shi
Prosanta Gope
Behzad Abdolmaleki
Biplab Sikdar
2025
conf/sp
Privacy-Preserving Mutual Authentication Protocol for Federated Learning in Intelligent Transportation Systems.
Rohini Poolat Parameswarath
Biplab Sikdar
2024
journals/tifs
Attacking Delay-Based PUFs With Minimal Adversarial Knowledge.
Hongming Fei
Owen Millwood
Prosanta Gope
Jack Miskelly
Biplab Sikdar
2024
journals/popets
VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication.
Xun Yuan
Yang Yang
Prosanta Gope
Aryan Mohammadi Pasikhani
Biplab Sikdar
2024
conf/ccs
A Correlation-Based Multi-Step Attack Scenario Detection Framework Using MITRE ATT&CK Mapping.
Qiaoran Meng
Nay Oo
Yuning Jiang
Hoon Wei Lim
Biplab Sikdar
2024
conf/esorics
Optimal Machine-Learning Attacks on Hybrid PUFs.
Hongming Fei
Prosanta Gope
Owen Millwood
Biplab Sikdar
2024
conf/host
PhenoAuth: A Novel PUF-Phenotype-Based Authentication Protocol for IoT Devices.
Hongming Fei
Owen Millwood
Prosanta Gope
Jack Miskelly
Biplab Sikdar
2023
conf/host
A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers.
Owen Millwood
Hongming Fei
Prosanta Gope
Oguz Narli
Meltem Kurt Pehlivanoglu
Elif Bilge Kavun
Biplab Sikdar
2023
conf/asiaccs
POSTER: Security Logs Graph Analytics for Industry Network System.
Qiaoran Meng
Nay Oo
Hoon Wei Lim
Biplab Sikdar
2020
journals/tifs
A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks.
Nalam Venkata Abhishek
Anshoo Tandon
Teng Joon Lim
Biplab Sikdar
2019
journals/tifs
Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids.
Prosanta Gope
Biplab Sikdar
2018
conf/cns
An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart Grids.
Prosanta Gope
Biplab Sikdar
2017
conf/ccs
Secure Data Provenance for the Internet of Things.
Muhammad Naveed Aman
Kee Chaing Chua
Biplab Sikdar
2017
conf/ccs
Spatio-Temporal Correlations in Cyber-Physical Systems: A Defense Against Data Availability Attacks.
Biplab Sikdar
2017
conf/cns
Efficient detection of false data injection attacks on AC state estimation in smart grids.
R. James Ranjith Kumar
Biplab Sikdar
2016
conf/ccs
Position Paper: Physical Unclonable Functions for IoT Security.
Muhammad Naveed Aman
Kee Chaing Chua
Biplab Sikdar
Coauthors
Anshoo Tandon
(1)
Aryan Mohammadi Pasikhani
(1)
Behzad Abdolmaleki
(1)
Biplab Sikdar
(16)
Elif Bilge Kavun
(1)
Hongming Fei
(4)
Hoon Wei Lim
(2)
Jack Miskelly
(2)
Kee Chaing Chua
(2)
Meltem Kurt Pehlivanoglu
(1)
Muhammad Naveed Aman
(2)
Nalam Venkata Abhishek
(1)
Nay Oo
(2)
Oguz Narli
(1)
Owen Millwood
(4)
Prosanta Gope
(8)
Qiaoran Meng
(2)
Quan Shi
(1)
R. James Ranjith Kumar
(1)
Rohini Poolat Parameswarath
(1)
Teng Joon Lim
(1)
Xun Yuan
(1)
Yang Yang
(2)
Yuning Jiang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to