Debasis Giri

1.8k total citations
90 papers, 1.1k citations indexed

About

Debasis Giri is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Debasis Giri has authored 90 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 38 papers in Computer Networks and Communications, 36 papers in Information Systems and 26 papers in Artificial Intelligence. Recurrent topics in Debasis Giri's work include User Authentication and Security Systems (26 papers), Advanced Authentication Protocols Security (25 papers) and Cryptography and Data Security (14 papers). Debasis Giri is often cited by papers focused on User Authentication and Security Systems (26 papers), Advanced Authentication Protocols Security (25 papers) and Cryptography and Data Security (14 papers). Debasis Giri collaborates with scholars based in India, United Kingdom and United States. Debasis Giri's co-authors include Tanmoy Maitra, Ruhul Amin, SK Hafizul Islam, Biswapati Jana, R. Simon Sherratt, Shyamal Kumar Mondal, Mohammad S. Obaidat, Muhammad Khurram Khan, Ashok Kumar Das and Shehzad Ashraf Chaudhry and has published in prestigious journals such as The Journal of Chemical Physics, SHILAP Revista de lepidopterología and Expert Systems with Applications.

In The Last Decade

Debasis Giri

82 papers receiving 1.0k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Debasis Giri India 19 528 497 280 229 198 90 1.1k
Lianhai Wang China 18 427 0.8× 465 0.9× 394 1.4× 117 0.5× 217 1.1× 107 1.1k
Yau-Hwang Kuo Taiwan 19 286 0.5× 173 0.3× 357 1.3× 301 1.3× 67 0.3× 82 1.1k
Khaled Alghathbar Saudi Arabia 16 623 1.2× 672 1.4× 321 1.1× 481 2.1× 341 1.7× 60 1.3k
Chun Chen China 16 379 0.7× 144 0.3× 230 0.8× 320 1.4× 57 0.3× 51 1.0k
Suresh Jagannathan United States 28 1.4k 2.6× 649 1.3× 871 3.1× 67 0.3× 132 0.7× 155 2.5k
Wai‐Kong Lee Malaysia 17 331 0.6× 475 1.0× 526 1.9× 334 1.5× 68 0.3× 97 1.3k
Cong Wang China 18 227 0.4× 180 0.4× 420 1.5× 159 0.7× 67 0.3× 99 894
Ou Wu China 18 154 0.3× 205 0.4× 642 2.3× 380 1.7× 129 0.7× 68 1.1k
Shmuel Katz Israel 22 590 1.1× 383 0.8× 780 2.8× 135 0.6× 64 0.3× 84 1.6k
Félix J. García Clemente Spain 20 673 1.3× 309 0.6× 461 1.6× 82 0.4× 260 1.3× 97 1.4k

Countries citing papers authored by Debasis Giri

Since Specialization
Citations

This map shows the geographic impact of Debasis Giri's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Debasis Giri with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Debasis Giri more than expected).

Fields of papers citing papers by Debasis Giri

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Debasis Giri. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Debasis Giri. The network helps show where Debasis Giri may publish in the future.

Co-authorship network of co-authors of Debasis Giri

This figure shows the co-authorship network connecting the top 25 collaborators of Debasis Giri. A scholar is included among the top collaborators of Debasis Giri based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Debasis Giri. Debasis Giri is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wazid, Mohammad, et al.. (2024). An effective intrusion detection scheme for Distributed Network Protocol 3 (DNP3) applied in SCADA-enabled IoT applications. Computers & Electrical Engineering. 120. 109828–109828. 2 indexed citations
2.
Kar, Samarjit, et al.. (2024). Multi-objective brainstorm optimization algorithm based on Bayesian inference learning automaton for solving CVRP with time windows. Applied Soft Computing. 162. 111755–111755. 5 indexed citations
3.
Wazid, Mohammad, et al.. (2024). Design of Blockchain-Envisioned Document Verification System. 1–6.
5.
Maity, Samir, et al.. (2023). Emergent multipath COVID-19 specimen collection problem with green corridor through variable length GA. Expert Systems with Applications. 232. 120879–120879. 2 indexed citations
6.
Das, Ashok Kumar, et al.. (2023). Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey. Security and Privacy. 7(2). 3 indexed citations
7.
Dutta, Subrata, et al.. (2023). Optimum Node Deployment Policy (ONDP) for WSN: Trade-off Between Maximization of Area Coverage and Lifetime. Wireless Personal Communications. 133(2). 1055–1080. 2 indexed citations
8.
9.
Maitra, Tanmoy, et al.. (2022). Chaotic neural networks and farfalle construction based parallel keyed secure hash function. Security and Privacy. 5(6). 1 indexed citations
10.
Chatterjee, Rajdeep, et al.. (2021). Real-Time Speech Emotion Analysis for Smart Home Assistants. IEEE Transactions on Consumer Electronics. 67(1). 68–76. 78 indexed citations
11.
Maitra, Tanmoy, et al.. (2021). Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map. Journal of Information Security and Applications. 61. 102915–102915. 3 indexed citations
12.
Maitra, Tanmoy, Debasis Giri, & R. N. Mohapatra. (2019). SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol. Cryptologia. 43(3). 212–232. 4 indexed citations
13.
Maitra, Tanmoy, Mohammad S. Obaidat, Debasis Giri, Subrata Dutta, & Keshav Dahal. (2019). ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications. IET Networks. 8(5). 289–298. 18 indexed citations
14.
Dutta, Subrata, Mohammad S. Obaidat, Keshav Dahal, Debasis Giri, & Sarmistha Neogy. (2018). M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes. IEEE Systems Journal. 13(1). 215–225. 8 indexed citations
15.
Dutta, Subrata, Mohammad S. Obaidat, Keshav Dahal, Debasis Giri, & Sarmistha Neogy. (2018). Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN. IEEE Systems Journal. 13(1). 289–300. 8 indexed citations
16.
Jana, Biswapati, Debasis Giri, & Shyamal Kumar Mondal. (2016). Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Diffierence Expansion. International journal of network security. 18(4). 633–643. 14 indexed citations
17.
Mohapatra, R. N., Dipanwita Roy Chowdhury, & Debasis Giri. (2015). Mathematics and computing : ICMC, Haldia, India, January 2015. Journal of International Crisis and Risk Communication Research. 2 indexed citations
18.
Mohapatra, R. N., et al.. (2014). Mathematics and Computing 2013. Springer proceedings in mathematics & statistics. 1 indexed citations
19.
Giri, Debasis, et al.. (2008). A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security. International journal of network security. 7. 223–234. 8 indexed citations
20.
Giri, Debasis, et al.. (2007). An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies. International journal of network security. 4. 348–354. 6 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026