scispace - formally typeset
D

Debashis Mahata

Researcher at Wipro

Publications -  5
Citations -  201

Debashis Mahata is an academic researcher from Wipro. The author has contributed to research in topics: Authentication & Encryption. The author has an hindex of 3, co-authored 5 publications receiving 104 citations.

Papers
More filters
Journal ArticleDOI

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

TL;DR: This paper develops an authentication and key exchange protocol by combining the ideas of Identity based Encryption, PUFs and Key-ed Hash Function to show that this combination can help to do away with the requirement to store the secret challenge-response pair explicitly at the verifier end.
Posted Content

PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs.

TL;DR: This paper develops an authentication and key exchange protocol by combining the ideas of Identity based Encryption, PUFs and Key-ed Hash Function to show that this combination can help to do away with the requirement to store the secret challenge-response pair explicitly at the verifier end.
Proceedings ArticleDOI

PUFSSL: An OpenSSL Extension for PUF based Authentication

TL;DR: This work proposes an idea to modify the Handshake Protocol in the SSL/TSL layer for authentication of client-server pair and secret key share, substituting the RSA/DSA certificate exchange with the proposed PUF based scheme.
Proceedings ArticleDOI

Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions

TL;DR: This work proposes to use an unconventional hardware security primitive named Physically Unclonable Functions (PUFs) to nullify the impact of KRACK attack by ensuring a mutual authentication before establishing the communication between the authenticators and the supplicants.
Patent

Method and system for determining performance of an application installed on mobile stations

TL;DR: In this article, an application performance detection system configures each of the mobile stations upon receiving a performance assessment request to ensure deactivation of hardware and software modules that cause additional network traffic and resource utilization.