Manik Lal Das
YOU?
Author Swipe
View article: One Touch Pay: An Innovative Quick and Secure Payment System
One Touch Pay: An Innovative Quick and Secure Payment System Open
In comparison to conventional payment systems, the suggested biometric-based digital transaction system, which uses fingerprint technology, offers improved security, simplicity, and convenience. By removing the need to carry several cards …
View article: A Machine Learning – Based Study on Customer Satisfaction with Public and Private Transport in Guruvayoor Municipality
A Machine Learning – Based Study on Customer Satisfaction with Public and Private Transport in Guruvayoor Municipality Open
Transportation systems play a crucial role in urban development, impacting accessibility, convenience, and economic efficiency. This study applies machine learning techniques to analyze customer satisfaction with public and private transpo…
View article: An Efficient and Verifiable Ownership Transfer of Cloud Data
An Efficient and Verifiable Ownership Transfer of Cloud Data Open
In this work, we have proposed a scheme for ownership transfer of outsourced data. This scheme also addresses data ownership verification. We have compared our scheme with the existing schemes in the literature and concluded that the sheme…
View article: An Efficient and Verifiable Ownership Transfer of Cloud Data
An Efficient and Verifiable Ownership Transfer of Cloud Data Open
In this work, we have proposed a scheme for ownership transfer of outsourced data. This scheme also addresses data ownership verification. We have compared our scheme with the existing schemes in the literature and concluded that the sheme…
View article: Hatey Bazarey - A Novel Approach to Ensure Food Security In Lockdown Period Through An Android App
Hatey Bazarey - A Novel Approach to Ensure Food Security In Lockdown Period Through An Android App Open
The adverse effects of the Novel Corona Virus or COVID – 19 on countries like United States of America, Italy, and Spain depicts how fast this virus can spread due to our irresponsible living habits. Till date, social distancing is the onl…
View article: On Aadhaar Identity Management System
On Aadhaar Identity Management System Open
A unique identification for citizens can lead to effective governance to manage and provide citizen-centric services. While ensuring this service, privacy of the citizens needs to be preserved. Aadhaar, the identification system by UIDAI h…
View article: Web Application Attack Detection using Deep Learning
Web Application Attack Detection using Deep Learning Open
Modern web applications are dominated by HTTP/HTTPS messages that consist of one or more headers, where most of the exploits and payloads can be injected by attackers. According to the OWASP, the 80 percent of the web attacks are done thro…
View article: Verifiable and Private Oblivious Polynomial Evaluation
Verifiable and Private Oblivious Polynomial Evaluation Open
View article: Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications Open
View article: DigiLock: User-controlled and Server-aware Digital Locker System
DigiLock: User-controlled and Server-aware Digital Locker System Open
The growing popularity of digital systems have paved the way for digital locker that ensures security and safety of the digital documents in store. While facilitating this system to user and availing its services offered by service provide…
View article: Detection of Node Capture Attack in Wireless Sensor Networks
Detection of Node Capture Attack in Wireless Sensor Networks Open
Wireless sensor networks (WSNs) deployed in hostile environments for applications such as battle-field surveillance are vulnerable to various attacks, including node capture attack wherein an adversary physically captures, reprograms, and …
View article: Image Authentication using Visual Cryptography
Image Authentication using Visual Cryptography Open
This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been desc…
View article: Verifiable Private Polynomial Evaluation
Verifiable Private Polynomial Evaluation Open
Delegating the computation of a polynomial to a server in a verifiable way is challenging. An even more challenging problem is ensuring that this polynomial remains hidden to clients who are able to query such a server. In this paper, we f…