Sukumar Nandi
Cited by
Cited by
Additive Cellular Automata: Theory and Applications, Volume 1
PP Chaudhuri, DR Chowdhury, S Nandi, S Chattopadhyay
John Wiley & Sons, 1997
Theory and applications of cellular automata in cryptography
S Nandi, BK Kar, PP Chaudhuri
IEEE Transactions on computers 43 (12), 1346-1357, 1994
A new similarity measure using Bhattacharyya coefficient for collaborative filtering in sparse data
BK Patra, R Launonen, V Ollikainen, S Nandi
Knowledge-Based Systems 82, 163-177, 2015
A tutorial survey on vehicular communication state of the art, and future research directions
PK Singh, SK Nandi, S Nandi
Vehicular Communications 18, 100164, 2019
Detecting ARP spoofing: An active technique
V Ramachandran, S Nandi
Information Systems Security: First International Conference, ICISS 2005 …, 2005
An outlier detection method based on clustering
R Pamula, JK Deka, S Nandi
2011 second international conference on emerging applications of information …, 2011
Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract
PK Singh, R Singh, SK Nandi, KZ Ghafoor, DB Rawat, S Nandi
IEEE Transactions on Intelligent Transportation Systems, 2020
Route stability based qos routing in mobile ad hoc networks
N Sarma, S Nandi
Wireless Personal Communications 54, 203-224, 2010
Comments on" Theory and applications of cellular automata in cryptography"[with reply]
SR Blackburn, S Murphy, KG Paterson, S Nandi, PP Chaudhuri
IEEE Transactions on Computers 46 (5), 637-639, 1997
CA and Its Applications: A Brief Survey
PP Chaudhuri, DR Chowdhury, S Nandi, S Chattopadhyay
Additive Cellular Automata-Theory and Applications 1, 6-25, 1997
Managing smart home appliances with proof of authority and blockchain
PK Singh, R Singh, SK Nandi, S Nandi
Innovations for Community Services: 19th International Conference, I4CS 2019 …, 2019
Analysis of periodic and intermediate boundary 90/150 cellular automata
S Nandi, PP Chaudhuri
IEEE Transactions on computers 45 (1), 1-12, 1996
Full auto rate MAC protocol for wireless ad hoc networks
Z Li, A Das, AK Gupta, SM Nandi
IEE proceedings-communications 152 (3), 311-319, 2005
Deciding handover points based on context-aware load balancing in a WiFi-WiMAX heterogeneous network environment
A Sarma, S Chakraborty, S Nandi
IEEE Transactions on Vehicular Technology 65 (1), 348-357, 2015
Machine learning based approach to detect position falsification attack in VANETs
PK Singh, S Gupta, R Vashistha, SK Nandi, S Nandi
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019
Additive Cellular Automata–Theory and Applications, vol. 1
P Pal Chaudhuri, D Roy Chowdhury, S Nandi, S Chatterjee
IEEE, computer society, 1997
Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization
M Agarwal, D Pasumarthi, S Biswas, S Nandi
International Journal of Machine Learning and Cybernetics 7, 1035-1051, 2016
Online voting system powered by biometric security using steganography
S Katiyar, KR Meka, FA Barbhuiya, S Nandi
2011 Second International Conference on Emerging Applications of Information …, 2011
Improving the reliability of IEEE 802.11 broadcast scheme for multicasting in mobile ad hoc networks
J Xie, A Das, S Nandi, AK Gupta
IEE Proceedings-Communications 153 (2), 207-212, 2006
A distance based clustering method for arbitrary shaped clusters in large datasets
BK Patra, S Nandi, P Viswanath
Pattern Recognition 44 (12), 2862-2870, 2011
The system can't perform the operation now. Try again later.
Articles 1–20