[16] Dutta, J. and Barman, S., 2024. Smart contract and blockchain-based secured approach for storing and sharing electronic health records. Multimedia Tools and Applications, (SCIE, I.F. 3.0, 2023) pp.1-25. https://doi.org/10.1007/s11042-024-19714-7
[15] Barman, S. (2025) ‘Towards Biometric Template Update Protocols for Crypto-biometric Constructions’, International Journal of Biometrics (Scopus, IF 0.7), Vol. 17, No. 4, pp. 349-375 . https://doi.org/10.1504/IJBM.2025.147187
[14] Jhuma Dutta, Subhas Barman, Soubhik Sen, Aniruddha Routh, Matangini Chattopadhyay and Samiran Chattopadhyay, EasyPay: A User-Friendly Blockchain-Powered Payment Gateway, Cluster Computing, (SCIE, IF 4.4), 2024, https://doi.org/10.1007/s10586-024-04506-3
[13] Subhas Barman, Chattopadhyay, S. & Samanta, D. A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment. SN COMPUT. SCI. 5, 292 (2024). https://doi.org/10.1007/s42979-024-02660-4 (SCOPUS)
[12] Subhas Barman, Samiran Chattopadhyay, Debasis Samanta, (2023)Towards Design a Secure Protocol for Updating Remotely Stored Credentials of a Crypto-Biometric Framework for Multi-Server Environment, (Accepted), Security and Privacy (Wiley, IF 1.9)
[11] R K Jha, S Bag, D Koley, G R Bojja, S Barman, An appropriate and cost-effective hospital recommender system for a patient of rural area using deep reinforcement learning, Intelligent Systems with Applications (Elsevier, SCOPUS), 2023, doi: https://doi.org/10.1016/j.iswa.2023.2
[10] A Banerjee, D Maji, R Datta, S Barman, D Samanta, S Chattopadhyay, "SHUBHCHINTAK: An Efficient Remote Health Monitoring Approach for Elderly People", Multimedia Tools and Applications, 2022, https://doi.org/10.1007/s11042-022-13, (SCIE, IF 3.6, 2022)
[9] Subhas Barman Chattopadhyay S, Samanta D, and Barman S. (2022), A Blockchain-Based Approach to Secure Electronic Health Records Using Fuzzy Commitment Scheme, Security and Privacy (Wiley, IF 1.9), 5(4), 2022,
[8] Subhas Barman, Shum, H. P., Chattopadhyay, S., & Samanta, D. (2019). A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme. IEEE Access, 7, 12557-12574. (SCIE, IF 3.9)
[7] Panchal, Gaurang, Debasis Samanta, and Subhas Barman. "Biometric-based cryptography for digital content protection without any key storage." Multimedia Tools and Applications 78(19) (2019): 26979-27000. (SCIE, IF 3.6)
[6] Subhas Barman; Atanu Sarkar; Rajat Kamal Roy; Sourav Saha; Kajal Rajak; Joydeep Sarkar, An approach to GIS-based traffic information system using Spatial Oracle, International Journal of Spatial, Temporal and Multimedia Information Systems, 2019 Vol.1 No.3, pp.253 - 27
[5] Subhas Barman, Ashok Kumar Das, Debasis Samanta, Samiran Chattopadhyay, Joel JPC Rodrigues, and Youngho Park. "Provably secure multi-server authentication protocol using fuzzy commitment." IEEE Access 6 (2018): 38578-38594. (SCIE, IF 3.9)
[4] Subhas Barman, Samiran Chattopadhyay, Debasis Samanta and Gaurang Panchal (2016) ’A novel secure key-exchange protocol using biometrics of the sender and receiver’, Computers and Electrical Engineering (Elsevier) 64 (2017): 65-82 (SCIE, IF 4.152)
[3] Subhas Barman, Debasis Samanta, and Samiran Chattopadhyay "Fingerprint-based crypto-biometric system for network security", EURASIPJournal on Information Security,(Springer, IF 3) 2015,1:3, pp. 1-17, DOI: 10.1186/s13635-015-0020-1
[2] Subhas Barman, Debasis Samanta, and Samiran Chattopadhyay'Approach to cryptographic key generation from fingerprint biometrics', Int. J. Biometrics, Vol. 7, No. 3, pp.226-248. (ESCI, Impact Factor: 0.7)
[1] Subhas Barman, Pal, U., Sarfaraj, M.A., Biswas, B., Mahata, A. and Mandal, P. (2016) 'A complete literature review on financial fraud detection applying data mining techniques', Int. J. Trust Management in Computing and Communications, Vol. 3, No. 4, pp.336-359
[35] Jhuma Dutta, Aakanksha Mishra, Sagarika Saha, Chayan Das, Subhas Barman, Matangini Chattopadhyay, Samiran Chattopadhyay, A Secure Blockchain-Based Patient-Centric Electronic Health Record System for Diabetes Detection Using Machine Learning in the IEEE 2025 International Conference on Computing, Intelligence, and Application (CIACON 2025), Durgapur, West Bengal, July 2025 (Accepted)
[34] Jhuma Dutta, Diptesh Karmakar, Subhas Barman, Matangini Chattopadhyay, Samiran Chattopadhyay, IoT Integrated Blockchain-Based Pharmaceutical Cold Storage Management System: Enhancing Integrity and Traceability, in the IEEE 2025 International Conference on Computing, Intelligence, and Application (CIACON 2025), Durgapur, West Bengal, July 2025 (Accepted)
[33] Writabrata Chakraborti, Subhas Barman, and Amitava Ray, Introducing Dynamic Threshold Apriori-Based Approach for Question Prediction Through Frequent Pattern Mining, in the IEEE 2025 International Conference on Computing, Intelligence, and Application (CIACON 2025), Durgapur, West Bengal, July 2025 (Accepted)
[32] Sayan Kumar Bhowmick, Subhas Barman, Shilpa Das, Achintya Mandal, Md. Shahil, Redefining Cyberbullying Detection with Kolmogorov-Arnold Networks(KANs) for Building Interpretable AI Beyond Black-Box MLPs, in IEEE Guwahati Subsection Conference 2025 (IEEE GCON 2025), NERIST, Arunachal Pradesh, India. (Accepted)
[31] Saptaparnee Saha, Subhas Barman, Jhuma Dutta, Santanu Shaw, Argha Sinha, A Secure and Transparent Blockchain driven E-Voting System Using Smart Contract and IPFS-based Scalability, in IEEE Guwahati Subsection Conference 2025 (IEEE GCON 2025), NERIST, Arunachal Pradesh, India. (Accepted).
[30] Bedagranee Ghosh, Jhuma Dutta, Subhas Barman, Secured Crowdfunding System Using Hardhat and Blockchain, in National Conference on Recent Trends in Science and Technology (NCRTST 2025), Jalpaiguri, West Bengal, India
[29] Saptaparnee Saha, Subhas Barman, Jhuma Dutta, Blockchain-Based Mobile Location Tracking System: A Secure and Decentralized Approach, in National Conference on Recent Trends in Science and Technology (NCRTST 2025), Jalpaiguri, West Bengal, India.
[28] Sayan Kumar Bhowmick, Subhas Barman, Saroj Kr. Biswas, A Multidimensional Approach to Context-Aware Cyberbullying Detection Through Metadata Analysis, Intelligent Computing and Technology Conference (ICTCon 2024), Assam, Springer in Communications in Computer and Information Science series (CCIS), 2024 (Accepted & Presented)
[27] Subhas Barman and Jhuma Dutta, A Blockchain-based Solution for Certification of Sustainable Organic Tea Production. in 7th Regional Science & Technology Congress 2024-2025 (Region 1), 24th & 25th January 2025, Siliguri, West Bengal
[26] Sagarika Saha, Jhuma Dutta, and Subhas Barman, Integrating machine learning with Blockchain: A secure Patient-Centric electronic health record system for Breast Cancer detection 7th Regional Science & Technology Congress 2024-2025 (Region 1), 24th & 25th January 2025, Siliguri, West Bengal (Selected for the Best Paper Award)
[25] Jhuma Dutta, Nisha Yadav, Ayan Kumar Pal, and Subhas Barman, Unlocking the potential of Non-Fungible Tokens and its implementation. 7th Regional Science & Technology Congress 2024-2025 (Region 1), 24th & 25th January 2025, Siliguri, West Bengal
[24] A. Khan, S. K. Biswas, C. Chunka and Subhas Barman, "Ensembled Obstructive Sleep Apnea Detection Using Extra Tree Ensemble Technique," 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT), Gharuan, India, 2024, pp. 342-347, doi: 10.1109/InCACCT61598.2024.10551088.
[23] Aihik Biswas, Subhas Barman, Debasis Samanta, "Cracking the Mystique: Unveiling the Secrets of BL-Codes", 3rd International Conference on Network Security and Blockchain Technology, Jalpaiguri, India. (Accepted and Presented).
[22] S. Barman, J. Dutta (2024), "Fingerprint-Based Three Factor Scheme for Bio-Cryptographic Key Generation," 3rd International Conference on Network Security and Blockchain Technology, Jalpaiguri, India. (Accepted and Presented).
[21] A. Khan, S. K. Biswas, C. Chunka and S. Barman, "Ensembled Obstructive Sleep Apnea Detection Using Extra Tree Ensemble Technique," 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT), Gharuan, India, 2024, pp. 342-347, doi: 10.1109/InCACCT61598.2024.10551088.
[20] Jhuma Dutta, Subhas Barman, Secured Scheme for Maintaining e-Health Records Based on Blockchain Technology, in Emerging & Technology including Emerging Technologies of 6th Regional Science & Technology Congress, 2023-24 Department of Science & Technology & Biotechnology, Government of West Bengal
[19] Jhuma Dutta, Rajib Ghosh, Subhas Barman, Blockchain-Based Application for Secure Social Communication, in Emerging & Technology including Emerging Technologies of 6th Regional Science & Technology Congress, 2023-24 organized by Department of Science & Technology & Biotechnology, Government of West Bengal
[18] Jhuma Dutta, Subhas Barman, Rathit Bandyopadhyay, Moumita Ghoshs, "Lightweight Authentication Protocol for E-Healthcare Systems using Fuzzy Commitment Scheme", in Frontiers of ICT in Healthcare: Proceedings of EAIT 2022, 201-213.
[17] Mukuldeep Maiti, Subhas Barman, Dipra Bhagat, (2022). LIVECHAIN: Lightweight Blockchain for IOT Devices and It’s Security. In: Giri, D., Mandal, J.K., Sakurai, K., De, D. (eds) Proceedings of International Conference on Network Security and Blockchain Technology. ICNSBT 2021. Lecture Notes in Networks and Systems, vol 481. pp.265–275 Springer, Singapore.
[16] Das, A. Das, A. Datta, S. Si and Subhas Barman, "Deep Approaches on Malicious URL Classification," 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2020, pp. 1-6, doi: 10.1109/ICCCNT49239.2020.9225338.
[15] Subhas Barman, Chaudhuri, A., Chatterjee, A., Ramiz Raza, M. (2020). An Elliptic Curve Cryptography-Based Multi-Server Authentication Scheme Using Cancelable Biometrics. In: Bhateja, V., Satapathy, S., Zhang, YD., Aradhya, V. (eds) Intelligent Computing and Communication. ICICC 2019. Advances in Intelligent Systems and Computing, vol 1034. Springer, Singapore. https://doi.org/10.1007/978-981-15-1084-7_16
[14] Subhas Barman, Guha, P., Saha, R., Ghosh, S. (2019). Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment. In: Chakraborty, M., Chakrabarti, S., Balas, V., Mandal, J. (eds) Proceedings of International Ethical Hacking Conference 2018. Advances in Intelligent Systems and Computing, vol 811. Springer, Singapore. https://doi.org/10.1007/978-981-13-1544-2_7
[13] Choudhury, Akash Roy, Anik Ghosh, Rahul Pandey, and Subhas Barman. "Emotion recognition from speech signals using excitation source and spectral features." In 2018 IEEE Applied Signal Processing Conference (ASPCON), pp. 257-261. IEEE, 2018.
[12] Somnath Rakshit, Suvojit Manna, Riyanka Kundu, Sanket Biswas, Priti Gupta, Sayantan Maitra, Subhas Barman,"Comparison of Various Methods to Predict the Occurrence of Diabetes in Female Pima Indians", in National Conference on Recent Trends in Information Technology \& Management (RTITM 2017), Jalpaiguri, India.
[11] Somnath Rakshit, Suvojit Manna, Riyanka Kundu, Sanket Biswas, Priti Gupta, Sayantan Maitra, Subhas Barman, "Prediction of Diabetes Type-II using a Two-Class Neural Network", In: International Conference on Computational Intelligence, Communications and Business Analytics (CICBA 2017), 24-25 March 2017, Kolkata, India (Springer)
[10] Suvojit Manna, Sanket Biswas, Riyanka Kundu, Somnath Rakshit, Priti Gupta, Subhas Barman, "A Statistical Approach to Predict Flight Delay Using Gradient Boosted Decision Tree" In: IEEE International Conference on Computational Intelligence in Data Science (ICCIDS 2017), 02 Jun - 03 Jun 2017, Chennai, India
[9] Subhas Barman, Debasis Samanta, Samiran Chattopadhyay, Sujoy Bag and Goutam Show, "An Efficient Minutiae Based Fingerprint Matching Approach Using Perimeter of Triangle Formed with Nearby Minutiae Points" In Proceedings of International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV 2015), pp.90-94, 29-30 January 2015 NIT Shillong India.
[8] Subhas Barman, Ajitesh Kumar Barman, Bapi Panda, Pintu Sharma, "Implementation of a smart map using spatial oracle," in Proceedings of 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT 2015}), vol., no., pp.1-5, 7-8 Feb. 2015 Kolkata, India DOI: 10.1109/C3IT.2015.7060183
[7] Subhas Barman, Debasis Samanta, Samiran Chattopadhyay, "Revocable key generation from irrevocable biometric data for symmetric cryptography," in Proceedings of 2015 Third International Conference on Computer, Communication, Control and Information Technology} (C3IT 2015), vol., no., pp.1-4, 7-8 Feb. 2015, Kolkata, DOI:10.1109/C3IT.2015.7060182
[6] A Chakraborty, P Nandi, A Datta, P Bar, Subhas Barman, and S Begum, "A Proposed Approach to Generate Revocable Fingerprint Template Using Cartesian Transformation," in Proceedings of 1st International Science & Technology Congress (IEMCONGRESS 2014), pp.196-201, 28th-31st August 2014, Kolkata, India.
[5] Subhas Barman, S Chattopadhyay and D Samanta, "An Approach to Cryptographic Key Distribution Through Fingerprint Based Key Distribution Center," in Proceedings of 3rd International Conference on Advances in Computing, Communications and Informatics (ICACCI 2014), (pp.1629-1635). IEEE, 24-27 Sept. 2014, Delhi, India, DOI: 10.1109/ICACCI.2014.6968299
[4] Subhas Barman, D Samanta, S Chattopadhyay, "Fingerprint Based Symmetric Cryptography" in Proceedings of International Conference on High-Performance Computing and Applications} (ICHPCA-2014), pp.1-6, 22-24 December 2014, Bhubaneswar, India, DOI:10.1109/ICHPCA.2014.7045306
[3] Subhas Barman, S Chattopadhyay and D Samanta, S Bag and G Show, "An Efficient Fingerprint Matching Approach Based on Minutiae to Minutiae Distance Using Indexing With Effectively Lower Time Complexity", In Proceedings of 2014 International Conference on Information Technology (ICIT-2014), pp.179-183, 22-24 December 2014, Bhubaneswar, India, DOI: 10.1109/ICIT.2014.46
[2] Subhas Barman, Chattopadhyay, S., Samanta, D. (2014). An Approach to Cryptographic Key Exchange Using Fingerprint. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_15
[1] Subhas Barman, Debasis Samanta, and Samiran Chattopadhyay, "An Approach of Biometric Based Cryptographic Key Sharing" in Proceedings of International Conference on Communication and Computing (ICC 2014), 12-14 June' 2014, pp. 151-158, Bengaluru, India.
1 IEEE Transaction on Consumer Electronics
2 IEEE Journal of Biomedical and Health Informatics
3 The Journal of Supercomputing, Springer Nature
4 Journal of Ambient Intelligence and Humanized Computing, Springer Nature
5 IET Biometrics, Wiley
6 IEEE Access
7 IET Intelligent Transport Systems
8 Concurrency and Computation: Practice and Experience, Wiley
9 Cybernetics and Systems, Tailor & Francis
10 Expert Systems With Applications, Elsevier