Amitabh Saxena
According to our database1,
Amitabh Saxena
authored at least 31 papers
between 2003 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
2004
2006
2008
2010
2012
2014
2016
2018
2020
0
1
2
3
4
5
6
7
8
9
2
2
5
1
3
1
2
2
1
1
2
1
1
5
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts.
IACR Cryptol. ePrint Arch., 2020
2019
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019
2016
Proceedings of the 9th India Software Engineering Conference, 2016
Proceedings of the International Workshop on Continuous Software Evolution and Delivery, 2016
2015
Proceedings of the 2015 Asia-Pacific Software Engineering Conference, 2015
Data Vaporizer - Towards a Configurable Enterprise Data Storage Framework in Public Cloud.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
Proceedings of the Financial Cryptography and Data Security, 2014
2013
Proceedings of the International Conference on Advances in Computing, 2013
2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Communications and Multimedia Security, 2010
2009
Proceedings of the Information Security, 12th International Conference, 2009
2008
Enforcing and defying associativity, commutativity, totality, and strong noninvertibility for worst-case one-way functions.
Theor. Comput. Sci., 2008
Int. J. Inf. Comput. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
2006
Proceedings of IEEE International Conference on Communications, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2005 International Symposium on Autonomous Decentralized Systems, 2005
Enforcing and Defying Associativity, Commutativity, Totality, and Strong Noninvertibility for One-Way Functions in Complexity Theory.
Proceedings of the Theoretical Computer Science, 9th Italian Conference, 2005
Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Computational Science and Its Applications, 2005
Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003