Personal information

Verified email domains

Security, Cryptography
India

Biography

Dr. Soumyadev Maity received his B.E. and M.Tech. degrees in Information Technology from University of Burdwan, West Bengal, India in 2004 and University of Calcutta, West Bengal, India in 2007 and Ph.D. degree from Indian Institute of Scince (IISc), Bangalore, India in 2015 respectively. Currently, Dr. S. Maity is engaged in network security and communicaion security as an Assistant Professor of Information Technology at the Indian Institute of Information Technology, Allahabad (IIIT-A), India.

Activities

Employment (4)

Indian Institute of Information Technology Allahabad: Allahabad, Uttar Pradesh, IN

2017-06-16 to present | Assistant Professor (Information Technology)
Employment
Source: Self-asserted source
Soumyadev Maity

National Institute of Technology Rourkela: Rourkela, Orissa, IN

2015-08 to 2017-05 | Post-Doctoral Fellow (Computer Science & Engineering)
Employment
Source: Self-asserted source
Soumyadev Maity

Indian Statistical Institute: Kolkata, West Bengal, IN

2014-11 to 2015-07 | Visiting Scientist (Advanced Computing & Microelectronics)
Employment
Source: Self-asserted source
Soumyadev Maity

Guru Nanak Institute of Technology: Kolkata, West Bengal, IN

2007-09 to 2008-12 | Lecturer (Information Technology)
Employment
Source: Self-asserted source
Soumyadev Maity

Education and qualifications (3)

Indian Institute of Science Bangalore: Bengaluru, Karnataka, IN

2009-01 to 2014-09 | PhD (Computer Science & Automation)
Education
Source: Self-asserted source
Soumyadev Maity

University of Calcutta: Kolkata, West Bengal, IN

2005 to 2007 | MTech (Information Technology)
Education
Source: Self-asserted source
Soumyadev Maity

Dr BC Roy Engineering College: Durgapur, West Bengal, IN

2000 to 2004 | B.E. (Information Technology)
Education
Source: Self-asserted source
Soumyadev Maity

Professional activities (2)

IEEE: New York, NY, US

2011-01 to present | Member Id:92165469
Membership
Source: Self-asserted source
Soumyadev Maity

University of Calcutta: Kolkata, West Bengal, IN

2007 | 1st Position in MTech (Information Technology)
Distinction
Source: Self-asserted source
Soumyadev Maity

Works (32)

Algebraic Signature based Trusted Execution Environment for Remote Computation

2025-01-04 | Conference paper
Contributors: Arnab Majumder; Shahnaz Warsi; Junaid Alam; Soumyadev Maity
Source: check_circle
Crossref

QSKA: A Quantum Secured Privacy-Preserving Mutual Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication

IEEE Transactions on Network and Service Management
2024-12 | Journal article
Contributors: Kumar Prateek; Soumyadev Maity; Neetesh Saxena
Source: check_circle
Crossref

Q-Secure-P²-SMA: Quantum-Secure Privacy- Preserving Smart Meter Authentication for Unbreakable Security in Smart Grid

IEEE Transactions on Network and Service Management
2024-10 | Journal article
Contributors: Kumar Prateek; Meghashrita Das; Sairaaj Surve; Soumyadev Maity; Ruhul Amin
Source: check_circle
Crossref

Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions

Journal of Industrial Information Integration
2024-05 | Journal article
Contributors: Vatsal Vasani; Kumar Prateek; Ruhul Amin; Soumyadev Maity; Ashutosh Dhar Dwivedi
Source: check_circle
Crossref

A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks

IEEE Access
2023 | Journal article
Contributors: Manohar Sai Burra; Soumyadev Maity
Source: check_circle
Crossref

An Unconditionally Secured Privacy-Preserving Authentication Scheme for Smart Metering Infrastructure in Smart Grid

IEEE Transactions on Network Science and Engineering
2023-03-01 | Journal article
Contributors: Kumar Prateek; Soumyadev Maity; Ruhul Amin
Source: check_circle
Crossref

A Privacy Preserving Authentication Protocol Using Quantum Computing for V2I Authentication in Vehicular Ad Hoc Networks

Security and Communication Networks
2022-03-04 | Journal article
Contributors: Kumar Prateek; Fahiem Altaf; Ruhul Amin; Soumyadev Maity; Barbara Masucci
Source: check_circle
Crossref

Certificateless Reliable and Privacy-Preserving Auditing of Group Shared Data for FOG-CPSs

Security and Communication Networks
2022-02-04 | Journal article
Contributors: Manohar Sai Burra; Soumyadev Maity; Ruhul Amin
Source: check_circle
Crossref

A Brief Survey of Challenge–Response Authentication Mechanisms

Lecture Notes in Networks and Systems
2021 | Book
EID:

2-s2.0-85098156858

Part of ISSN: 23673389 23673370
Contributors: Kushwaha, P.; Sonkar, H.; Altaf, F.; Maity, S.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

A comprehensive survey on attacks and security protocols for VANETs

Lecture Notes in Networks and Systems
2021 | Book chapter
EID:

2-s2.0-85105116843

Part of ISSN: 23673389 23673370
Contributors: Islam, A.; Ranjan, S.; Rawat, A.P.; Maity, S.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Certificate-less public key encryption for secure e-Healthcare systems

2019 IEEE Conference on Information and Communication Technology, CICT 2019
2019 | Conference paper
EID:

2-s2.0-85084309927

Contributors: Aditia, M.K.; Paida, S.; Altaf, F.; Maity, S.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Certificateless aggregate message authentication for hierarchical trusted authority based VANET

Proceedings of the 3rd International Conference on Computing Methodologies and Communication, ICCMC 2019
2019 | Conference paper
EID:

2-s2.0-85072758848

Contributors: Dewangan, R.; Altaf, F.; Maity, S.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Detection of beacon transmission denial attack in its using temporal auto-correlation and random inspections

PervasiveHealth: Pervasive Computing Technologies for Healthcare
2019 | Conference paper
EID:

2-s2.0-85060931026

Part of ISSN: 21531633
Contributors: Sultana, S.; Burra, M.S.; Altaf, F.; Maurya, C.; Aditia, M.K.; Maity, S.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Leakage resilient searchable symmetric encryption with periodic updation

Proceedings of the International Conference on Trends in Electronics and Informatics, ICOEI 2019
2019 | Conference paper
EID:

2-s2.0-85075809418

Contributors: Shrishti; Burra, M.S.; Maurya, C.; Maity, S.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Linearly Homomorphic Signature Based Secure Computation Outsourcing in Vehicular Adhoc Networks

2019 Innovations in Power and Advanced Computing Technologies, i-PACT 2019
2019 | Conference paper
EID:

2-s2.0-85078991112

Contributors: Vasudha; Altaf, F.; Maity, S.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Optimized CL-PKE with lightweight encryption for resource constrained devices

PervasiveHealth: Pervasive Computing Technologies for Healthcare
2019 | Conference paper
EID:

2-s2.0-85060932648

Part of ISSN: 21531633
Contributors: Aditia, M.K.; Burra, M.S.; Altaf, F.; Maurya, C.; Maity, S.; Singh, M.R.; Sahoo, S.S.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Privacy preserving lightweight searchable encryption for cloud assisted e-health system

2019 International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2019
2019 | Conference paper
EID:

2-s2.0-85083236938

Contributors: Altaf, F.; Aditia, M.; Saini, E.; Rakshit, B.; Maity, S.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Privacy preserving zone based service provisioning in intelligent transportation systems

Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2017
2018 | Conference paper
EID:

2-s2.0-85046357037

Contributors: Gujjula, V.P.; Maity, S.; Jena, S.K.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

A design and classification framework for routing protocols in MANETs

International Journal of Wireless and Mobile Computing
2017 | Journal article
EID:

2-s2.0-85026833289

Part of ISSN: 17411092 17411084
Contributors: Kumar, N.; Hansdah, R.C.; Maity, S.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

A lightweight remote user authentication protocol for smart E-health networking environment

Proceedings of the International Conference on IoT in Social, Mobile, Analytics and Cloud, I-SMAC 2017
2017 | Conference paper
EID:

2-s2.0-85034567073

Contributors: Bala, D.Q.; Maity, S.; Jena, S.K.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

An efficient lightweight stream cipher algorithm for wireless networks

IEEE Wireless Communications and Networking Conference, WCNC
2017 | Conference paper
EID:

2-s2.0-85019768367

Part of ISSN: 15253511
Contributors: Maity, S.; Sinha, K.; Sinha, B.P.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

IBC based verifiable hash chains for reliable internet access in intelligent transportation systems

2017 International Conference on Information Communication and Embedded Systems, ICICES 2017
2017 | Conference paper
EID:

2-s2.0-85039901153

Contributors: Mishra, S.; Maity, S.; Jena, S.K.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Mutual authentication for IoT smart environment using certificate-less public key cryptography

Proceedings of 2017 3rd IEEE International Conference on Sensing, Signal Processing and Security, ICSSS 2017
2017 | Conference paper
EID:

2-s2.0-85039921823

Contributors: Bala, D.Q.; Maity, S.; Jena, S.K.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Security and performance analysis of the SEAP authentication protocol in MANETs

International Journal of Ad Hoc and Ubiquitous Computing
2017 | Journal article
EID:

2-s2.0-85014706227

Part of ISSN: 17438233 17438225
Contributors: Maity, S.; Hansdah, R.C.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Secure routing with an integrated localized key management protocol in MANETs

Proceedings - International Conference on Advanced Information Networking and Applications, AINA
2014 | Conference paper
EID:

2-s2.0-84903829746

Part of ISSN: 1550445X
Contributors: Talawar, S.H.; Maity, S.; Hansdah, R.C.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Self-organized public key management in MANETs with enhanced security and without certificate-chains

Computer Networks
2014 | Journal article
EID:

2-s2.0-84898994889

Part of ISSN: 13891286
Contributors: Maity, S.; Hansdah, R.C.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless Networks

Communications in Computer and Information Science
2013 | Book
EID:

2-s2.0-84903821856

Part of ISSN: 18650929
Contributors: Jambhulkar, P.J.; Maity, S.; Hansdah, R.C.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

A protocol for authentication with multiple levels of anonymity (AMLA) in vanets

Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013
2013 | Conference paper
EID:

2-s2.0-84881411078

Contributors: Bhavesh, N.B.; Maity, S.; Hansdah, R.C.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

A secure and efficient authentication protocol (SEAP) for MANETs with membership revocation

Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013
2013 | Conference paper
EID:

2-s2.0-84881459685

Contributors: Maity, S.; Hansdah, R.C.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

A voucher assisted adaptive acknowledgement based intrusion detection protocol for MANETs

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84893098195

Part of ISSN: 03029743 16113349
Contributors: Maity, S.; Hansdah, R.C.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Certificate-less on-demand public key management (CLPKM) for self-organized MANETs

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84871542562

Part of ISSN: 03029743 16113349
Contributors: Maity, S.; Hansdah, R.C.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Membership models and the design of authentication protocols for MANETs

Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012
2012 | Conference paper
EID:

2-s2.0-84860709692

Contributors: Maity, S.; Hansdah, R.C.
Source: Self-asserted source
Soumyadev Maity via Scopus - Elsevier

Peer review (5 reviews for 5 publications/grants)

Review activity for Cluster computing. (1)
Review activity for Information systems frontiers. (1)
Review activity for Journal of network and computer applications. (1)
Review activity for SN computer science. (1)
Review activity for Telecommunications systems. (1)