scispace - formally typeset
S

Saurabh Dey

Researcher at Dalhousie University

Publications -  12
Citations -  201

Saurabh Dey is an academic researcher from Dalhousie University. The author has contributed to research in topics: Mobile cloud computing & Cloud computing. The author has an hindex of 7, co-authored 12 publications receiving 153 citations. Previous affiliations of Saurabh Dey include University of Mysore.

Papers
More filters
Journal ArticleDOI

A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks

TL;DR: A machine learning based intrusion detection scheme for mobile clouds involving heterogeneous client networks that does not require rule updates and its complexity can be customized to suit the requirements of the client networks.
Posted Content

A security suite for wireless body area networks

TL;DR: In this paper, the authors presented a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBAN, and KEMESIS, a key management mechanism for security in inter-sensor communication.
Journal ArticleDOI

A security suite for wireless body area networks

TL;DR: A security suite for WBANs is presented, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security ofWBANs, and KEMESIS, a key management schemes for security in inter-sensor communication.
Proceedings ArticleDOI

Message digest as authentication entity for mobile cloud computing

TL;DR: This paper proposes an innovative authentication scheme for mobile cloud computing, MDA, which only uses existing hardware and platforms to prevent most of the potential attacks during the authentication process between a mobile device and the cloud.
Journal ArticleDOI

MDA: message digest-based authentication for mobile cloud computing

TL;DR: This paper presents a novel authentication scheme, Message Digest-based Authentication (MDA), which strategically incorporates hashing, in addition to traditional user ID and passwords, to achieve mutual authentication and is capable of withstanding a variety of different security attacks.