Department of Mathematics
Research Publication
Title of paper | Name of Author/s | Name of Journal | Year of Publication |
---|---|---|---|
Primal hybrid method for quasilinear parabolic problems | R Shokeen, A Patel, A K Pani | Journal of Scientific Computing | Accepted |
A note on an enhanced dynamic authentication scheme for mobile satellite communication systems | Uddeshaya Kumar and Manish Garg | International Journal of Satellite Communications and Networking | Accepted |
On the Higher-Order Nonlinearity of a Boolean Bent Function class (Constructed via Niho power functions) | Kezia Saini and Manish Garg | Cryptography and Communications Discrete Structures, Boolean Functions and Sequences, Springer Nature | Accepted |
Rokhlin property for group actions on Hilbert C*-modules, | S. Dey, H. Osaka and H. Trivedi | Southeast Asian Bull. Math. | 2022 |
A Post Eriori Error Analysis of a distributed Optimal Control Problem Governed by von Karman Equations | Neela Nataraj, Sudipto Chowdhury, Asha Dond, Devika Shylaja. | ESAIM: M2AN | 2022 |
CCAKESC: Chaotic map based Construction of a new Authenticated Key Exchange Protocol for Satellite Communication | Uddeshaya Kumar and Manish Garg | International Journal of Satellite Communications and Networking, Wiley | 2021 |
Hybrid method for two parameter singularly perturbed elliptic boundary value problems | Jha, Anuradha ; Kadalbajoo, Mohan Krishen | Comput. Math. Methods | 2021 |
Post-quantum secure inner product functional encryption using multivariate public key cryptography | Debnath, Sumit Kumar ; Mesnager, Sihem ; Dey, Kunal ; Kundu, Nibedita | Mediterr. J. Math. | 2021 |
Secure and efficient multiparty private set intersection cardinality | Debnath, Sumit Kumar ; Stănică, Pantelimon ; Kundu, Nibedita Choudhury, Tanmay | Adv. Math. Commun | 2021 |
Feasible private set intersection in quantum domain | Debnath, Sumit Kumar ; Dey, Kunal ; Kundu, Nibedita ; Choudhury, Tanmay | Quantum Inf. Process. | 2021 |
Learning with error based key agreement and authentication scheme for satellite communication | Uddeshaya Kumar, Manish Garg | International Journal of Satellite Communications and Networking | 2021 |
Doubly commuting invariant subspaces for representations of product systems of C*-correspondences | H. Trivedi and S. Veerabathiran | Annals of Functional Analysis | 2021 |
A mesh adaptation algorithm using new monitor and estimator function for discontinuous and layered solution | Kumar P., Gupta V., Dubey R.K. | Numerical Algebra, Control and Optimization | 2021 |
An application of variational iteration method for solving fuzzy time-fractional diffusion equations | Kumar S., Gupta V. | Neural Computing and Applications | 2021 |
Second-order parameter-uniform finite difference scheme for singularly perturbed parabolic problem with a boundary turning point | Sahoo SK, Gupta V. | Journal of Difference Equations and Applications | 2021 |
Robust higher order finite difference scheme for singularly perturbed turning point problem with two outflow boundary layers | Gupta V., Sahoo SK., Dubey R.K. | Computational and Applied Mathematics | 2021 |
Certain algebraic invariants of edge ideals of join of graphs | Kumar A., Kumar R., Sarkar R. | Journal of Algebra and its Applications | 2021 |
Regularity, Rees algebra, and Betti numbers of certain cover ideals. | Kumar, Ajay ; Kumar, Rajiv | Arch. Math. (Basel) | 2020 |
A study of chaos and its possible control in an eco-epidemiological model with alternative food source in predator and weak Allee effect in prey species | Nath, Binayak ; Kumar, Vikas ; Kumari, Nitu ; Das, Krishna Pada ; Maiti, Somnath | Nonlinear Stud. | 2020 |
An inventory model for deteriorating items with multivariate demand and trade credit | Kumar V., Sharma A., Kumar A., Gupta C.B. | Advances in Mathematics: Scientific Journal | 2020 |
Regularity of symbolic powers of edge ideals | Jayanthan A.V., Kumar R. | Journal of Pure and Applied Algebra | 2020 |
Plankton dynamics in nutrient-phytoplankton-zooplankton model with viral infection in phytoplankton | Nath, Binayak ; Roy, Prodip ; Sahani, Saroj Kumar ; Maiti, S. ; Das, Krishna pada | Nonlinear Stud. | 2020 |
Construction of lightweight authentication scheme for network applicants using smart cards | Dharminder D., Rana S., Kundu N., Mishra D. | Sadhana – Academy Proceedings in Engineering Sciences | 2020 |
1-out-of-2: post-quantum oblivious transfer protocols based on multivariate public key cryptography | Kundu N., Debnath S.K., Mishra D. | Sadhana – Academy Proceedings in Engineering Sciences | 2020 |
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party | Mishra D., Dharminder D., Yadav P., Sreenivasa Rao Y., Vijayakumar P., Kumar N. | Journal of Information Security and Applications | 2020 |
Post-quantum digital signature scheme based on multivariate cubic problem | Kundu N., Debnath S.K., Mishra D., Choudhury T. | Journal of Information Security and Applications | 2020 |
Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system | Rana S., Mishra D. | Multimedia Tools and Applications | 2020 |
Authenticated content distribution framework for digital rights management systems with smart card revocation | Mishra D., Rana S. | International Journal of Communication Systems | 2020 |
Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare | Rana S., Mishra D. | Journal of Medical Systems | 2020 |
SFVCC: Chaotic map-based security framework for vehicular cloud computing | Mishra D., Kumar V., Dharminder D., Rana S. | IET Intelligent Transport Systems | 2020 |
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing | Kumar V., Ahmad M., Mishra D., Kumari S., Khan M.K. | Vehicular Communications | 2020 |
LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication | Dharminder D., Mishra D. | Transactions on Emerging Telecommunications Technologies | 2020 |
Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services: Authorized Access to Healthcare Services | Dharminder D., Mishra D., Li X. | Journal of Medical Systems | 2020 |
Pseudo-completeness of the compact-open topology on C(X) | Kumar P., Garg P. | Topology and its Applications | 2020 |
A Mesh Refinement Algorithm for Singularly Perturbed Boundary and Interior Layer Problems | Dubey R.K., Gupta V. | International Journal of Computational Methods | 2020 |
A secure authentication framework for WSN-based safety monitoring in coal mines | Ansari A.A., Gera P., Mishra B., Mishra D. | Sadhana – Academy Proceedings in Engineering Sciences | 2020 |
Morley FEM for a Distributed Optimal Control Problens Governed by von K`arm`an Equations | Sudipto Chowdhury, Neela Nataraj, Devika Shylaja | Computational Methods in Applied Mathematics | 2020 |
Bures Distance and Transition Probability for α -CPD-Kernels | Dey S., Trivedi H. | Complex Analysis and Operator Theory | 2019 |
Generating wandering subspaces for doubly commuting covariant representations | H. Trivedi and S. Veerabathiran | Integral Equations Operator Theory | 2019 |
Disappearance of limit cycle oscillations in a predator-prey model: Role of mortality due to predation of infected prey | Das K.P., Ghosh S., Maiti S. | International Journal of Dynamical Systems and Differential Equations | 2019 |
A priori error analysis of the stabilized Lagrange multiplier method for elliptic problems with natural norms | Acharya S.K., Patel A. | Journal of Applied Mathematics and Computing | 2019 |
A parameter-uniform higher order finite difference scheme for singularly perturbed time-dependent parabolic problem with two small parameters | Gupta V., Kadalbajoo M.K., Dubey R.K. | International Journal of Computer Mathematics | 2019 |
PSMECS: A provably secure ID-based communication in mobile edge computing | Dharminder D., Mishra D. | International Journal of Communication Systems | 2019 |
An authentication framework for roaming service in global mobility networks | Srinivas J., Mishra D., Mukhopadhyay S., Kumari S., Guleria V. | Information Technology and Control | 2019 |
Radial-basis-function-based finite difference operator splitting method for pricing American options | Kadalbajoo M.K., Kumar, A., Tripathi, L.P. | International Journal of Computer Mathematics | 2018 |
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks | Srinivas, J., Mishra, D., Mukhopadhyay, S., Kumari, S. | Journal of Ambient Intelligence and Humanized Computing | 2018 |
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks | Mishra, D., Vijayakumar, P., Sureshkumar, V., Amin, R., Islam, S.H., Gope, P. | Multimedia Tools and Applications | 2018 |
Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card | Mishra, D., Dhal, S. | Wireless Personal Communications | 2018 |
A note on the higher-order nonlinearity of niho function | Garg M. | Fundamenta Informaticae | 2018 |
Higher order numerical approximation for time dependent singularly perturbed differential-difference convection-diffusion equations | Gupta, V., Kumar, M., Kumar, S | Numerical Methods for Partial Differential Equations | 2018 |
Existence of a weak solution for a class of fractional Laplacian equations | Raghavendra, V.; Kar, Rasmita | J. Aust. Math. Soc. | 2017 |
Risk-sensitive control of reflected diffusion processes on orthrant | Gauttam, Sunil Kumar ; Kumar, K. Suresh ; Pal, Chandan | Pure Appl. Funct. Anal. | 2017 |
A password based authentication scheme for wireless multimedia systems | Doshi, N., Kumari, S., Mishra, D., Li, X., Choo, K.-K.R., Sangaiah, A.K. | Multimedia Tools and Applications | 2017 |
Stabilized Lagrange multiplier method for elliptic and parabolic interface problems | Patel A., Acharya S.K., | Applied Numerical Mathematics | 2017 |
A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card | Srinivas, J., Mukhopadhyay, S., Mishra, D. | Wireless Personal Communications | 2017 |
External Source of Infection and Nutritional Efficiency Control Chaos in a Predator-Prey Model with Disease in the Predator | Pada Das, K., Roy, P., Ghosh, S., Maiti, S. | Biophysical Reviews and Letters | 2017 |
A Mutual Authentication Framework for Wireless Medical Sensor Networks | Srinivas, J., Mishra, D., Mukhopadhyay, S. | Journal of Medical Systems | 2017 |
Rheological fluid motion in tube by metachronal waves of cilia | Maiti, S., Pandey, S.K. | Applied Mathematics and Mechanics (English Edition) | 2017 |
A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme | Chaturvedi, A., Mishra, D., Jangirala, S., Mukhopadhyay, S. | Journal of Information Security and Applications | 2017 |
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks | Srinivas, J., Mukhopadhyay, S., Mishra, D. | Ad Hoc Networks | 2017 |
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks | Mishra, B. ; Mishra, D. | Wireless Personal Communications | 2017 |
Parameter free hybrid numerical method for solving modified Burgers’ equations on a nonuniform mesh | Mohan K. Kadalbajoo and Ashish Awasthi | Asian-European Journal of Mathematics | 2017 |
Radial-basis-function-based finite difference operator splitting method for pricing American options | Mohan K. Kadalbajoo,Alpesh Kumar &Lok Pati Tripathi | International Journal of Computer Mathematics | 2017 |
An Error Analysis of a Finite Element Method with IMEX-Time Semidiscretizations for Some Partial Integro-differential Inequalities Arising in the Pricing of American Options | Mohan K. Kadalbajoo, Lok Pati Tripathi, and Alpesh Kumar | SIAM Journal on Numerical Analysis | 2017 |
Design of a password-based authenticated key exchange protocol for SIP | Mishra, D. | Multimedia Tools and Applications | 2016 |
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography | Mishra, D., Das, A.K., Mukhopadhyay, S., Wazid, M. | Wireless Personal Communications | 2016 |
Primal hybrid method for parabolic problems | Acharya S.K., Patel A. | Applied Numerical Mathematics | 2016 |
Design of a secure smart card-based multi-server authentication scheme | Chaturvedi, A., Das, A.K., Mishra, D., Mukhopadhyay, S. | Journal of Information Security and Applications | 2016 |
Local maximum principle satisfying high-order non-oscillatory schemes | Dubey, R.K., Biswas, B., Gupta, V. | International Journal for Numerical Methods in Fluids | 2016 |
Qualitative analysis and numerical solution of burgers’ equation via B-spline collocation with implicit euler method on piecewise uniform mesh | Gupta, V., Kadalbajoo, M.K. | Journal of Numerical Mathematics | 2016 |
H-p spectral element methods for three dimensional elliptic problems on non-smooth domains, Part-III: Error estimates, preconditioners, computational techniques and numerical results | Dutt, P., Husain, A., Vasudeva Murthy, A.S., Upadhyay, C.S. | Computers and Mathematics with Applications | 2016 |
Least-squares spectral element method for three dimensional Stokes equations | Mohapatra, S., Husain, A. | Applied Numerical Mathematics | 2016 |
Design and Analysis of a Provably Secure Multi-server Authentication Scheme | Mishra, D. | Wireless Personal Communications | 2016 |
Research Center
Centre for Mathematical & Financial Computing (C-MFC)
Welcome to the newly formed interdisciplinary Centre for Mathematical & Financial Computing (C-MFC) at The LNM Institute of Information Technology, Jaipur. The centre is supported by DST-FIST grant received by the Department of Mathematics. The centre has been established as a physical centre at the Research, Innovation, and Entrepreneurship Park (RIEP) at the LNMIIT Jaipur.
Vision Statement:
The key vision of the Centre for Mathematical & Financial Computing is to be the leading research centre of international repute.