Follow
Somdip Dey FRSA
Somdip Dey FRSA
Data Science Lecturer @ York St John University | MIT Innovator Under 35 | World IP Review Leader
Verified email at yorksj.ac.uk - Homepage
Title
Cited by
Cited by
Year
Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work
S Dey
10th Computer Science and Electronic Engineering Conference, 2018
1082018
FoodSQRBlock: Digitizing food production and the supply chain with blockchain and QR code in the cloud
S Dey, S Saha, AK Singh, K McDonald-Maier
Sustainability 13 (6), 3486, 2021
872021
Advanced steganography algorithm using randomized intermediate QR host embedded with any encrypted secret message: ASA_QR algorithm
S Dey, K Mondal, J Nath, A Nath
International Journal of Modern Education and Computer Science 4 (6), 59, 2012
742012
Sd-eqr: A new technique to use qr codestm in cryptography
S Dey
arXiv preprint arXiv:1205.4829, 2012
582012
SD-EQR: A New Technique To Use QR CodesTM in Cryptography: Use of QR CodesTM In Data Hiding and Securing
S Dey
International Journal of Information Technology & Computer Science ( IJITCS ), 2012
58*2012
An Integrated Symmetric Key Cryptographic Method-Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm
S Dey, J Nath, A Nath
International Journal of Modern Education and Computer Science 4 (5), 1, 2012
552012
A Proof of Work: Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory
S Dey
International Journal of Wireless and Microwave Technologies 8 (5), 1-9, 2018
532018
SD-AEI: An advanced encryption technique for images
S Dey
2012 Second International Conference on Digital Information Processing and …, 2012
512012
Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System
S Dey, S Agarwal, A Nath
2013 IEEE International Conference on Communication Systems and Network …, 2013
492013
SD-EI: A cryptographic technique to encrypt images
S Dey
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
462012
An advanced combined symmetric key cryptographic method using bit manipulation, bit reversal, modified caesar cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm
S Dey, J Nath, A Nath
International Journal of Computer Applications 46 (20), 46-53, 2012
452012
SmartNoshWaste: Using blockchain, machine learning, cloud computing and QR code to reduce food waste in decentralized web 3.0 enabled smart cities
S Dey, S Saha, AK Singh, K McDonald-Maier
Smart Cities 5 (1), 162-176, 2022
432022
Dynamic energy and thermal management of multi-core mobile platforms: A survey
AK Singh, S Dey, K McDonald-Maier, KR Basireddy, GV Merrett, ...
IEEE Design & Test 37 (5), 25-33, 2020
382020
An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES
S Dey
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (2 …, 2012
352012
Modern encryption standard (mes) version-i: An advanced cryptographic method
S Dey, A Nath
2012 World Congress on Information and Communication Technologies, 242-247, 2012
342012
Socodecnn: Program source code for visual cnn classification using computer vision methodology
S Dey, AK Singh, DK Prasad, KD Mcdonald-Maier
IEEE Access 7, 157158-157172, 2019
332019
Edge Cooling Mode: An Agent Based Thermal Management Mechanism For DVFS Enabled Heterogeneous MPSoCs
S Dey, E Zaragoza Guajardo, K Reddy Basireddy, X Wang, ...
2019 32nd International Conference on VLSI Design and 2019 18th …, 2019
322019
Teem: Online thermal-and energy-efficiency management on cpu-gpu mpsocs
S Isuwa, S Dey, AK Singh, K McDonald-Maier
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 438-443, 2019
312019
SD-AREE: A new modified caesar cipher cryptographic method along with bit-manipulation to exclude repetition from a message to be encrypted
S Dey
arXiv preprint arXiv:1205.4279, 2012
272012
Design and Implementation of a Simple Cache Simulator in Java to Investigate MESI and MOESI Coherency Protocols
S Dey, MS Nair
International Journal of Computer Applications 87 (11), 6-13, 2014
262014
The system can't perform the operation now. Try again later.
Articles 1–20