default search action
Sunit Kumar Nandi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c18]Roshan Singh, Debanjan Roy Chowdhury, Sukumar Nandi, Sunit Kumar Nandi:
ATOM : A Decentralized Task Offloading Framework for Mobile Edge Computing through Blockchain and Smart Contracts. MetaCom 2023: 408-412 - [c17]Roshan Singh, Sukumar Nandi, Sunit Kumar Nandi:
An Implementation and Analysis of Zero Knowledge Based E-Voting Solution With Proof of Vote on Public Ethereum Blockchain. MetaCom 2023: 423-427 - 2021
- [j4]Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Kayhan Zrar Ghafoor, Danda B. Rawat, Sukumar Nandi:
Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract. IEEE Trans. Intell. Transp. Syst. 22(6): 3616-3630 (2021) - [c16]Sunit Kumar Nandi, Pranav Kumar Singh, Sukumar Nandi:
Evaluating DASH QoE with MPTCP Under Different MPTCP Buffer Sizes and Path Latencies. MeditCom 2021: 197-202 - [i1]Pranav Kumar Singh, Sukumar Nandi, Sunit Kumar Nandi, Uttam Ghosh, Danda B. Rawat:
Blockchain Meets AI for Resilient and Intelligent Internet of Vehicles. CoRR abs/2112.14078 (2021) - 2020
- [j3]Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Kayhan Zrar Ghafoor, Danda B. Rawat, Sukumar Nandi:
An efficient blockchain-based approach for cooperative decision making in swarm robotics. Internet Technol. Lett. 3(1) (2020) - [c15]Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Sukumar Nandi:
Designing a Blockchain Based Framework for IoT Data Trade. I4CS 2020: 295-308 - [c14]Madhurima Buragohain, Chinmoy Jyoti Kathar, Chinmoy Kachari, Sunit Kumar Nandi, Sukumar Nandi:
SCAN: Smart Collaborative Attack in Named Data Networking. LCN 2020: 124-133
2010 – 2019
- 2019
- [j2]Pranav Kumar Singh, Sahil Sharma, Sunit Kumar Nandi, Sukumar Nandi:
Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city. Veh. Commun. 15: 1-15 (2019) - [j1]Pranav Kumar Singh, Sunit Kumar Nandi, Sukumar Nandi:
A tutorial survey on vehicular communication state of the art, and future research directions. Veh. Commun. 18 (2019) - [c13]Saurabh, Satya Prakash, Pranav Kumar Singh, Sunit Kumar Nandi, Sukumar Nandi:
Is QUIC Quicker Than TCP? - A Performance Evaluation. AINA Workshops 2019: 129-138 - [c12]Pranav Kumar Singh, Rahul Raj Gupta, Sunit Kumar Nandi, Sukumar Nandi:
Machine Learning Based Approach to Detect Wormhole Attack in VANETs. AINA Workshops 2019: 651-661 - [c11]Sunit Kumar Nandi, Pranav Kumar Singh, Sukumar Nandi:
Evaluating DASH Player QoE with MPTCP in Presence of Packet Loss. AINA 2019: 821-833 - [c10]Pranav Kumar Singh, Prateek Vij, Arpan Vyas, Sunit Kumar Nandi, Sukumar Nandi:
Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity. ICDCIT 2019: 422-439 - [c9]Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Sukumar Nandi:
Smart Contract Based Decentralized Parking Management in ITS. I4CS 2019: 66-77 - [c8]Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Sukumar Nandi:
Managing Smart Home Appliances with Proof of Authority and Blockchain. I4CS 2019: 221-232 - [c7]Sunit Kumar Nandi, Pranav Kumar Singh, Sukumar Nandi:
Evaluating DASH Player QoE with MPTCP in Presence of a Shared Bottleneck Link. PIMRC 2019: 1-6 - [c6]Pranav Kumar Singh, Dharmesh Chourasiya, Ayush Singh, Sunit Kumar Nandi, Sukumar Nandi:
CCAPS: Cooperative Context Aware Privacy Scheme for VANETs. VTC Fall 2019: 1-5 - 2018
- [c5]Pranav Kumar Singh, Manish Kumar Dash, Paritosh Mittal, Sunit Kumar Nandi, Sukumar Nandi:
Misbehavior Detection in C-ITS Using Deep Learning Approach. ISDA (1) 2018: 641-652 - [c4]Pranav Kumar Singh, Shivam Gupta, Ritveeka Vashistha, Sunit Kumar Nandi, Sukumar Nandi:
Machine Learning Based Approach to Detect Position Falsification Attack in VANETs. ISEA-ISAP 2018: 166-178 - [c3]Pranav Kumar Singh, Sahil Sharma, Sunit Kumar Nandi, Roshan Singh, Sukumar Nandi:
Leader Election in Cooperative Adaptive Cruise Control Based Platooning. C3VP@MOBICOM 2018: 8-14 - [c2]Pranav Kumar Singh, Geetesh Saikamal Tabjul, Mohd Imran, Sunit Kumar Nandi, Sukumar Nandi:
Impact of Security Attacks on Cooperative Driving Use Case: CACC Platooning. TENCON 2018: 138-143 - [c1]Pranav Kumar Singh, Suraj Kumar Jha, Sunit Kumar Nandi, Sukumar Nandi:
ML-Based Approach to Detect DDoS Attack in V2I Communication Under SDN Architecture. TENCON 2018: 144-149
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint