Home‎ > ‎

Publications

Journals

  1. Saroj Kumar Panigrahy, Sanjay Kumar Jena, and Ashok Kumar Turuk. Study and analysis of human mental stress detection using galvanic skin response and heart rate sensors in wired and wireless environments. Research Journal of Pharmacy and Technology,10 (4):1168-1173, Apr 2017. ISSN: 0974-3618 (print); ISSN: 0974-360X (online). http://rjptonline.org/AbstractView.aspx?PID=2017-10-4-38. [SCOPUS]
  2. Saroj Kumar Panigrahy, Sanjay Kumar Jena, and Ashok Kumar Turuk. Study and analysis of human stress detection using galvanic skin response (GSR) sensor in wired and wireless environments. Research Journal of Pharmacy and Technology, 10(2):545-550, Feb 2017. ISSN: 0974-3618 (print); ISSN: 0974-360X (online). http://rjptonline.org/AbstractView.aspx?PID=2017-10-2-36. [SCOPUS]
  3. Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda. Image encryption using advanced hill cipher algorithm. ACEEE International Journal on Signal and Image Processing, 1(1):37–41, Jan 2010. ISSN: 2152-5048 (print); ISSN: 2152-5056 (online). https://www.searchdl.org/PagesPublic/JnlPaper.aspx?JnlPprID=688E51BE-E4D3-E711-A4C9-E4B3180586B9.
  4. Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda. Image encryption using advanced hill cipher algorithm. International Journal of Recent Trends in Engineering (Computer Science), 1(1):663–667, Jun 2009. ISSN: 1797-9617 (online). https://www.searchdl.org/PagesPublic/JnlIssueDetails.aspx?JnlIssueID=f5d7f770-dfd3-e711-a4c9-e4b3180586b9. 
  5. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, and Saroj Kumar Panigrahy. Novel methods of generating self-invertible matrix for hill cipher algorithm. International Journal of Security, CSC Journals, 1(1):14–21, Jun 2007. ISSN: 1985-2320 (Online-Open Access). http://www.cscjournals.org/library/manuscriptinfo.php?mc=IJS-2.

Conference Proceedings

  1. Gitanjali Behera, Saroj Kumar Panigrahy and Ashok Kumar Turuk. A biometric based anonymous user authentication technique in wireless body area networks. In International Conference on Communication, Computing and Internet of Things (IC3IOT-2018), Chennai, India, 15-17 Feb 2018. IEEE. https://ieeexplore.ieee.org/document/8668193.
  2. Saroj Kumar Panigrahy, Bibhu Prasad Das, Sathya Babu Korra, Sanjay Kumar Jena and Ashok Kumar Turuk. Comparative analysis of ECG based key agreement schemes in wireless body sensor networks. In International Conference on Advanced Computing, Networking, and Informatics (ICACNI-2017), Goa, India, 1-3 Jun 2017. Springer. https://link.springer.com/chapter/10.1007/978-981-10-8639-7_16
  3. Kaushal Kumar, Asish Kumar Dalai, Saroj Kumar Panigrahy and Sanjay Kumar Jena. An ANN Based Approach for Wireless Device Fingerprinting. In IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (RTEICT-2017), Bangalore, India, 19-20 May 2017. IEEE. https://doi.org/10.1109/RTEICT.2017.8256809.
  4. Ankit Taparia, Saroj Kumar Panigrahy and Sanjay Kumar Jena. Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison. In International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET-2017), pages 742-746, Chennai, India, 22-24 Mar 2017. IEEE. ISBN: 978-1-5090-4442-9/17. https://doi.org/10.1109/WiSPNET.2017.8299856.
  5. Sagarika Mohanty, Debasish Jena and Saroj Kumar Panigrahy. A Secure RSU-Aided Aggregation and BatchVerification Scheme for Vehicular Networks. In International Conference on Soft Computing and its Applications (ICSCA-2012), pages 174-178, Kuala Lumpur, Malaysia,  August 25-26, 012. http://psrcentre.org/images/extraimages/812573.pdf.
  6. Asish Kumar Dalai, Saroj Kumar Panigrahy, and Sanjay Kumar Jena. A novel approach for message authentication to prevent parameter tampering attack in web applications. In International Conference on Modelling, Optimisation and Computing (ICMOC-2012),  Elsevier Procedia Engineering, Vol. 38, pages 1495-1500, Kumaracoil, Tamilnadu, India, 10-11 Apr 2012.  http://dx.doi.org/10.1016/j.proeng.2012.06.184.
  7. Asish Kumar Dalai, Saroj Kumar Panigrahy, and Sanjay Kumar Jena. An approach to data integrity in web applications. In National Conference on Emerging Trend & Its Application in Engineering (NCETAE-2011), pages 347–350, Sarang, Odisha, India, 26-28 Dec 2011. http://dspace.nitrkl.ac.in/dspace/handle/2080/1589. 
  8. Bharati Mishra, Saroj Kumar Panigrahy, Tarini Charan Tripathy, Debasish Jena, and Sanjay Kumar Jena. A secure and efficient message authentication protocol for vanets with privacy preservation. In World Congress on Information Communication Technologies (WICT-2011), pages 884–889, Mumbai, India, 11-14 Dec 2011. IEEE. ISBN: 978-1-4673-0125-1. http://dx.doi.org/10.1109/WICT.2011.6141364. 
  9. Thrinatha Reddy M., Saroj Kumar Panigrahy, and Sanjay Kumar Jena. Man-in-the-middle attack and its countermeasure in bluetooth secure simple pairing. In International Conference on Information Processing (ICIP-2011), pages 367–376, Bangalore, India, 5-7 Aug 2011. Springer. ISBN: 978-3-642-22785-1. http://dx.doi.org/10.1007/978-3-642-22786-8_46. 
  10. Saroj Kumar Panigrahy, Sanjay Kumar Jena, and Ashok Kumar Turuk. Security in bluetooth, rfid and wireless sensor networks. In International Conference on Communication, Computing and Security (ICCCS-2011), pages 628–633, Rourkela, India, 12-14 Feb 2011. ACM. ISBN: 978-1-4503-0464-1. http://dx.doi.org/10.1145/1947940.1948071. 
  11. Sathya Babu Korra, Saroj Kumar Panigrahy, and Sanjay Kumar Jena. Web usage mining: An implementation view. In International Conference on Advances in Computing, Communication and Control (ICAC3-2011), pages 131–136, Mumbai, India, 28-29 Jan 2011. Springer. ISBN: 978-3-642-18439-0. http://dx.doi.org/10.1007/978-3-642-18440-6_16. 
  12. Saroj Kumar Panigrahy, Jyoti Ranjan Mahapatra, Jignyanshu Mohanty, and Sanjay Kumar Jena. Anomaly detection in ethernet networks using self organizing maps. In International Conference on Advances in Computing, Communication and Control (ICAC3-2011), pages 300–305, Mumbai, India, 28-29 Jan 2011. Springer. ISBN: 978-3-642-18439-0. http://dx.doi.org/10.1007/978-3-642-18440-6_38. 
  13. Saroj Kumar Panigrahy, Debasish Jena, and Sanjay Kumar Jena. A secure e-shopping using voice ordering. In International Conference on Recent Trends in Business Administration and Information Processing (BAIP-2010), pages 233–237, Trivandrum, India, 26-27 Mar 2010. Springer. ISBN: 978-3-642-12213-2. http://dx.doi.org/10.1007/978-3-642-12214-9_38. 
  14. Debasish Jena, Saroj Kumar Panigrahy, and Sanjay Kumar Jena. A novel and efficient cryptosystem for long message encryption. In International Conference on Industrial and Information Systems (ICIIS-09), pages 7–9, Peradeniya, Sri Lanka, 28-31 Dec 2009. IEEE. E-ISBN: 978-1-4244-4837-1, Print ISBN: 978-1-4244-4836-4. http://dx.doi.org/10.1109/ICIINFS.2009.5429899. 
  15. Debasish Jena, Saroj Kumar Panigrahy, Sanjay Kumar Jena, and Subhendu Kumar Pani. A modified remote user authentication scheme using smart card based on ecdlp. In International Conference on Industrial and Information Systems (ICIIS-09), pages 22–25, Peradeniya, Sri Lanka, 28-31 Dec 2009. IEEE. ISBN: 978-1-4244-4836-4. http://dx.doi.org/10.1109/ICIINFS.2009.5429898. 
  16. Bibhudendra Acharya, Sambit Kumar Shukla, Saroj Kumar Panigrahy, Sarat Kumar Patra,  and  Ganapati Panda.  H-S-X cryptosystem and its application to image encryption. In International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT-09), pages 720–724, Trivandrum, India, 28-29 Dec 2009. IEEE. ISBN: 978-1-4244-5321-4. http://dx.doi.org/10.1109/ACT.2009.183. 
  17. Saroj Kumar Panigrahy, Debasish Jena, Sathya Babu Korra, and Sanjay Kumar Jena. On the privacy protection of biometric traits: Palmprint, face, and signature. In International Conference on Contemporary Computing (IC3-09), pages 182–193, Noida, India, 17-19 Aug 2009. Springer. ISBN: 978-3-642-03546-3. http://dx.doi.org/10.1007/978-3-642-03547-0_18. 
  18. Debasish Jena, Sanjay Kumar Jena, Debashisa Mohanty, and Saroj Kumar Panigrahy. A novel remote user authentication scheme using smart card based on ecdlp. In International conference on Advanced Computer Control (ICACC-09), pages 246–249, Singapore, 22-24 Jan 2009. IEEE. ISBN: 978-1-4244-3330-8. http://dx.doi.org/10.1109/ICACC.2009.110. 
  19. Debasish Jena, Banshidhar Majhi, Saroj Kumar Panigrahy, and Sanjay Kumar Jena. Improved offline signature verification scheme using feature point extraction method. In 7th IEEE International conference on Cognitive Informatics (ICCI-08), pages 475–480, California, USA, 14-16 Aug 2008. IEEE. ISBN: 978-1-4244-2538-9. http://dx.doi.org/10.1109/COGINF.2008.4639204. 
  20. Debasish Jena, Saroj Kumar Panigrahy, Pradip Kumar Biswal, and Sanjay Kumar Jena. A novel protocol for smart card using ecdlp. In 1st IEEE International Conference on Emerging Trends in Engineering and Technology (ICETET-08), pages 838–843, Nagpur, India, 16-18 Jul 2008. IEEE. ISBN: 978-0-7695-3267-7. http://dx.doi.org/10.1109/ICETET.2008.126. 
  21. Saroj Kumar Panigrahy, Bibhudendra Acharya, and Debasish Jena. Image encryption using self-invertible key matrix of hill cipher algorithm. In International Conference on Advances on Computing (ICAC-08), pages 1–4, Chikhli, India, 21-22 Feb 2008. ICAC. http://dspace.nitrkl.ac.in/dspace/handle/2080/615. 
  22. Saroj Kumar Panigrahy, Debasish Jena, and Sanjay Kumar Jena. A rotational and translational-invariant palmprint recognition system. In International Conference on Data Engineering & Management (ICDEM-08), pages 380–383, Tiruchirapalli, India, 9 Feb 2008. ICDEM. http://dspace.nitrkl.ac.in/dspace/handle/2080/616. 
  23. Debasish Jena, Saroj Kumar Panigrahy, Bibhudendra Acharya, and Sanjay Kumar Jena. A novel ecdlp-based blind signature scheme. In National Conference on Information Security-Issues and Challenges (NCISIC-08), pages 37–40, Gunupur, Odisha, 19-20 Jan 2008. NCISIC. http://dspace.nitrkl.ac.in/dspace/handle/2080/617. 
  24. Saroj Kumar Panigrahy, Debasish Jena, and Sanjay Kumar Jena. An efficient palmprint recognition system. In National Conference on Recent Trends in Soft Computing (SynSoft-08), pages 70–73, Dhenkanal, Odisha, 19-20 Jan 2008. SYNSOFT. http://dspace.nitrkl.ac.in/dspace/handle/2080/618. 
  25. Debasish Jena, Sanjay Kumar Jena, Banshidhar Majhi, and Saroj Kumar Panigrahy. A novel ecdlp-based blind signature scheme with an illustration. In International Conference on Web Engineering and Applications (ICWA-07), pages 59–68, Bhubaneswar, India, 14-16 Dec 2007. Narosa. ISBN: 978-81-7319-917-2. http://dspace.nitrkl.ac.in/dspace/handle/2080/619.