List of Publication


Title of paper Name of Author/s Name of Journal Year of Publication
Primal hybrid method for quasilinear parabolic problems R Shokeen, A Patel, A K Pani Journal of Scientific Computing Accepted
A note on an enhanced dynamic authentication scheme for mobile satellite communication systems Uddeshaya Kumar and Manish Garg International Journal of Satellite Communications and Networking Accepted
On the Higher-Order Nonlinearity of a Boolean Bent Function class (Constructed via Niho power functions) Kezia Saini and Manish Garg Cryptography and Communications Discrete Structures, Boolean Functions and Sequences, Springer Nature Accepted
Rokhlin property for group actions on Hilbert C*-modules, S. Dey, H. Osaka and H. Trivedi Southeast Asian Bull. Math. 2022
A Post Eriori Error Analysis of a distributed Optimal Control Problem Governed by von Karman Equations Neela Nataraj, Sudipto Chowdhury, Asha Dond, Devika Shylaja. ESAIM: M2AN 2022
CCAKESC: Chaotic map based Construction of a new Authenticated Key Exchange Protocol for Satellite Communication Uddeshaya Kumar and Manish Garg International Journal of Satellite Communications and Networking, Wiley 2021
Hybrid method for two parameter singularly perturbed elliptic boundary value problems Jha, Anuradha ;  Kadalbajoo, Mohan Krishen Comput. Math. Methods   2021
Post-quantum secure inner product functional encryption using multivariate public key cryptography Debnath, Sumit Kumar ;  Mesnager, Sihem ;  Dey, Kunal ;  Kundu, Nibedita Mediterr. J. Math.   2021
Secure and efficient multiparty private set intersection cardinality Debnath, Sumit Kumar ;  Stănică, Pantelimon ;  Kundu, Nibedita Choudhury, Tanmay Adv. Math. Commun 2021
Feasible private set intersection in quantum domain Debnath, Sumit Kumar ;  Dey, Kunal ;  Kundu, Nibedita ;  Choudhury, Tanmay Quantum Inf. Process. 2021
Learning with error based key
agreement and authentication
scheme for satellite communication
Uddeshaya Kumar,
Manish Garg
International Journal of Satellite
Communications and Networking
2021
Doubly commuting invariant subspaces for representations of product systems of C*-correspondences H. Trivedi and S. Veerabathiran Annals of Functional Analysis 2021
A mesh adaptation algorithm using new monitor and estimator function for discontinuous and layered solution Kumar P., Gupta V., Dubey R.K. Numerical Algebra, Control and Optimization 2021
An application of variational iteration method
for solving fuzzy time-fractional diffusion
equations
Kumar S., Gupta V. Neural Computing and Applications 2021
Second-order parameter-uniform finite difference scheme for singularly perturbed parabolic problem with a boundary turning point Sahoo SK, Gupta V. Journal of Difference Equations and Applications 2021
Robust higher order finite difference scheme for singularly perturbed turning point problem with two outflow boundary layers Gupta V., Sahoo SK., Dubey R.K. Computational and Applied Mathematics 2021
Certain algebraic invariants of edge ideals of join of graphs Kumar A., Kumar R., Sarkar R. Journal of Algebra and its Applications 2021
Regularity, Rees algebra, and Betti numbers of certain cover ideals. Kumar, Ajay ;  Kumar, Rajiv Arch. Math. (Basel)   2020
A study of chaos and its possible control in an eco-epidemiological model with alternative food source in predator and weak Allee effect in prey species Nath, Binayak ;  Kumar, Vikas ;  Kumari, Nitu ;  Das, Krishna Pada ;  Maiti, Somnath Nonlinear Stud. 2020
An inventory model for deteriorating items with multivariate demand and trade credit Kumar V., Sharma A., Kumar A., Gupta C.B. Advances in Mathematics: Scientific Journal 2020
Regularity of symbolic powers of edge ideals Jayanthan A.V., Kumar R. Journal of Pure and Applied Algebra 2020
Plankton dynamics in nutrient-phytoplankton-zooplankton model with viral infection in phytoplankton Nath, Binayak ;  Roy, Prodip ;  Sahani, Saroj Kumar ;  Maiti, S. ;  Das, Krishna pada Nonlinear Stud.   2020
Construction of lightweight authentication scheme for network applicants using smart cards Dharminder D., Rana S., Kundu N., Mishra D. Sadhana - Academy Proceedings in Engineering Sciences 2020
1-out-of-2: post-quantum oblivious transfer protocols based on multivariate public key cryptography Kundu N., Debnath S.K., Mishra D. Sadhana - Academy Proceedings in Engineering Sciences 2020
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party Mishra D., Dharminder D., Yadav P., Sreenivasa Rao Y., Vijayakumar P., Kumar N. Journal of Information Security and Applications 2020
Post-quantum digital signature scheme based on multivariate cubic problem Kundu N., Debnath S.K., Mishra D., Choudhury T. Journal of Information Security and Applications 2020
Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system Rana S., Mishra D. Multimedia Tools and Applications 2020
Authenticated content distribution framework for digital rights management systems with smart card revocation Mishra D., Rana S. International Journal of Communication Systems 2020
Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare Rana S., Mishra D. Journal of Medical Systems 2020
SFVCC: Chaotic map-based security framework for vehicular cloud computing Mishra D., Kumar V., Dharminder D., Rana S. IET Intelligent Transport Systems 2020
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing Kumar V., Ahmad M., Mishra D., Kumari S., Khan M.K. Vehicular Communications 2020
LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication Dharminder D., Mishra D. Transactions on Emerging Telecommunications Technologies 2020
Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services: Authorized Access to Healthcare Services Dharminder D., Mishra D., Li X. Journal of Medical Systems 2020
Pseudo-completeness of the compact-open topology on C(X) Kumar P., Garg P. Topology and its Applications 2020
A Mesh Refinement Algorithm for Singularly Perturbed Boundary and Interior Layer Problems Dubey R.K., Gupta V. International Journal of Computational Methods 2020
A secure authentication framework for WSN-based safety monitoring in coal mines Ansari A.A., Gera P., Mishra B., Mishra D. Sadhana - Academy Proceedings in Engineering Sciences 2020
Morley FEM for a Distributed Optimal Control Problens Governed by von K`arm`an Equations Sudipto Chowdhury, Neela Nataraj, Devika Shylaja Computational Methods in Applied Mathematics 2020
Bures Distance and Transition Probability for α -CPD-Kernels Dey S., Trivedi H. Complex Analysis and Operator Theory 2019
Generating wandering subspaces for doubly commuting covariant representations H. Trivedi and S. Veerabathiran Integral Equations Operator Theory 2019
Disappearance of limit cycle oscillations in a predator-prey model: Role of mortality due to predation of infected prey Das K.P., Ghosh S., Maiti S. International Journal of Dynamical Systems and Differential Equations 2019
A priori error analysis of the stabilized Lagrange multiplier method for elliptic problems with natural norms Acharya S.K., Patel A. Journal of Applied Mathematics and Computing 2019
A parameter-uniform higher order finite difference scheme for singularly perturbed time-dependent parabolic problem with two small parameters Gupta V., Kadalbajoo M.K., Dubey R.K. International Journal of Computer Mathematics 2019
PSMECS: A provably secure ID-based communication in mobile edge computing Dharminder D., Mishra D. International Journal of Communication Systems 2019
An authentication framework for roaming service in global mobility networks Srinivas J., Mishra D., Mukhopadhyay S., Kumari S., Guleria V. Information Technology and Control 2019
Radial-basis-function-based finite difference operator splitting method for pricing American options Kadalbajoo M.K., Kumar, A., Tripathi, L.P. International Journal of Computer Mathematics 2018
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks Srinivas, J., Mishra, D., Mukhopadhyay, S., Kumari, S. Journal of Ambient Intelligence and Humanized Computing 2018
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks Mishra, D., Vijayakumar, P., Sureshkumar, V., Amin, R., Islam, S.H., Gope, P. Multimedia Tools and Applications 2018
Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card Mishra, D., Dhal, S. Wireless Personal Communications 2018
A note on the higher-order nonlinearity of niho function Garg M. Fundamenta Informaticae 2018
Higher order numerical approximation for time dependent singularly perturbed differential-difference convection-diffusion equations Gupta, V., Kumar, M., Kumar, S Numerical Methods for Partial Differential Equations 2018
Existence of a weak solution for a class of fractional Laplacian equations Raghavendra, V.;  Kar, Rasmita J. Aust. Math. Soc.   2017
Risk-sensitive control of reflected diffusion processes on orthrant Gauttam, Sunil Kumar ;  Kumar, K. Suresh ;  Pal, Chandan Pure Appl. Funct. Anal.   2017
A password based authentication scheme for wireless multimedia systems Doshi, N., Kumari, S., Mishra, D., Li, X., Choo, K.-K.R., Sangaiah, A.K. Multimedia Tools and Applications 2017
Stabilized Lagrange multiplier method for elliptic and parabolic interface problems Patel A., Acharya S.K., Applied Numerical Mathematics 2017
A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card Srinivas, J., Mukhopadhyay, S., Mishra, D. Wireless Personal Communications 2017
External Source of Infection and Nutritional Efficiency Control Chaos in a Predator-Prey Model with Disease in the Predator Pada Das, K., Roy, P., Ghosh, S., Maiti, S. Biophysical Reviews and Letters 2017
A Mutual Authentication Framework for Wireless Medical Sensor Networks Srinivas, J., Mishra, D., Mukhopadhyay, S. Journal of Medical Systems 2017
Rheological fluid motion in tube by metachronal waves of cilia Maiti, S., Pandey, S.K. Applied Mathematics and Mechanics (English Edition) 2017
A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme Chaturvedi, A., Mishra, D., Jangirala, S., Mukhopadhyay, S. Journal of Information Security and Applications 2017
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks Srinivas, J., Mukhopadhyay, S., Mishra, D. Ad Hoc Networks 2017
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks Mishra, B. ; Mishra, D. Wireless Personal Communications 2017
Parameter free hybrid numerical method for solving modified Burgers’ equations on a nonuniform mesh Mohan K. Kadalbajoo and Ashish Awasthi Asian-European Journal of Mathematics 2017
Radial-basis-function-based finite difference operator splitting method for pricing American options Mohan K. Kadalbajoo,Alpesh Kumar &Lok Pati Tripathi International Journal of Computer Mathematics 2017
An Error Analysis of a Finite Element Method with IMEX-Time Semidiscretizations for Some Partial Integro-differential Inequalities Arising in the Pricing of American Options Mohan K. Kadalbajoo, Lok Pati Tripathi, and Alpesh Kumar SIAM Journal on Numerical Analysis 2017
Design of a password-based authenticated key exchange protocol for SIP Mishra, D. Multimedia Tools and Applications 2016
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography Mishra, D., Das, A.K., Mukhopadhyay, S., Wazid, M. Wireless Personal Communications 2016
Primal hybrid method for parabolic problems Acharya S.K., Patel A. Applied Numerical Mathematics 2016
Design of a secure smart card-based multi-server authentication scheme Chaturvedi, A., Das, A.K., Mishra, D., Mukhopadhyay, S. Journal of Information Security and Applications 2016
Local maximum principle satisfying high-order non-oscillatory schemes Dubey, R.K., Biswas, B., Gupta, V. International Journal for Numerical Methods in Fluids 2016
Qualitative analysis and numerical solution of burgers' equation via B-spline collocation with implicit euler method on piecewise uniform mesh Gupta, V., Kadalbajoo, M.K. Journal of Numerical Mathematics 2016
H-p spectral element methods for three dimensional elliptic problems on non-smooth domains, Part-III: Error estimates, preconditioners, computational techniques and numerical results Dutt, P., Husain, A., Vasudeva Murthy, A.S., Upadhyay, C.S. Computers and Mathematics with Applications 2016
Least-squares spectral element method for three dimensional Stokes equations Mohapatra, S., Husain, A. Applied Numerical Mathematics 2016
Design and Analysis of a Provably Secure Multi-server Authentication Scheme Mishra, D. Wireless Personal Communications 2016