Research Services Division

Deakin Research

Research Output for Biplob R. Ray

Note: The 2012, 2013, 2014 publications have not been audited.

Jump to: Publications | Grants and Consultancies | HDR completions

Publications

2013 School of Information Technology

Ray, Biplob R., Chowdhury, Morshed and Abawajy, Jemal (2013) StenoCipher to provide data confidentiality and tampered data recovery for RFID tag, in Lee, Roger (eds), Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, pp. 37-51, Springer-Verlag Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Ray, Biplob Rakshit, Chowdhury, Morshed and Abawajy, Jemal (2013) Hybrid approach to ensure data confidentiality and tampered data recovery for RFID tag, International journal of networked and distributed computing, vol. 1, no. 2, pp. 79-88, Atlantis Press, Paris, France [C2]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

2013 External

Chowdhury, Morshed U. and Ray, Biplob R.* (2013) Security risks/vulnerability in a RFID system and possible defenses, in Karmakar, Nemai Chandra (eds), Advanced RFID systems, security, and applications, pp. 1-15, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Ray, Biplob R.*, Chowdhury, Morshed and Abawajy, Jemal (2013) Critical analysis and comparative study of security for networked RFID systems, in Unknown (ed.), SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin, pp. 197-202, IEEE Computer Society Conference Publishing Services, Piscataway, N. J [E1]
DRO entry for this publication

2012 School of Information Technology

Ray, Biplob R., Chowdhury, Morshed and Abawajy, Jemal (2012) Secure mobile RFID ownership transfer protocol to cover all transfer scenarios, in Kwack, Kae Dal; Kawata, Shigeo; Hwang, Soonwook; Han, Dongsoo and Ko, Franz (eds), ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology, pp. 1185-1192, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

2011 External

Ray, B.*, Huda, Shamsul* and Chowdhury, Morshed U. (2011) Smart RFID reader protocol for malware detection, in Unknown (ed.), SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, pp. 64-69, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

2010 External

Biplob, Ray*, Chowdhury, Morshed U. and Pham, Thao (2010) Mutual authentication with malware protection for a RFID system, in Sajeev, A.S.M. (eds), ITS 2010 : Proceedings of the Annual International Conference on Information Technology Security, pp. 24-29, Global Science & Technology Forum (GSTF), Singapore [E1]
DRO entry for this publication

Ray, Biplob R.* and Chowdhury, Morshed U. (2010) Enhanced RFID mutual authentication scheme based on shared secret information, in Harris, Frederick C. Jr. and Hu, Fei (eds), CAINE 2010 : Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, pp. 208-213, International Society for Computers and their Applications (ISCA)., Cary, N.C. [E1]
DRO entry for this publication

Grants and Consultancies

No grants and/or consultancies found or audited – the 2014 HERDC financial return has not been completed or loaded as yet.

Higher Degree by Research Completions supervised by Biplob R. Ray

No completions found or audited.

Legend:
* Not a member of Deakin University at time of output.

DRO to publications collection last synchronised: Monday 28th July 2014 10:04pm

Deakin University acknowledges the traditional land owners of present campus sites.

23rd July 2011