Anish Mathuria
According to our database1,
Anish Mathuria
authored at least 39 papers
between 1998 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
1
1
1
1
1
1
1
1
1
2
1
2
4
1
4
1
3
3
1
2
1
1
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
IACR Cryptol. ePrint Arch., 2022
2021
Proceedings of the Information Systems Security - 17th International Conference, 2021
2020
Information Security and Cryptography, Springer, ISBN: 978-3-662-58145-2, 2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020
2019
Cybersecur., 2019
Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements.
Proceedings of the Information Systems Security - 15th International Conference, 2019
2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018
2017
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the 18th International Conference on Distributed Computing and Networking, 2017
Proceedings of the Research Advances in Cloud Computing, 2017
2016
Proceedings of the Eighth IEEE International Conference on Technology for Education, 2016
2015
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Security in Computing and Communications, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network.
Proceedings of the Information Systems Security - 11th International Conference, 2015
2014
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
2013
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the 6th ACM India Computing Convention, 2013
2012
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation.
Proceedings of the Distributed Computing and Internet Technology, 2012
2008
2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
2006
Proceedings of the Information Systems Security, Second International Conference, 2006
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
2004
Proceedings of the High Performance Computing, 2004
2003
Information Security and Cryptography, Springer, ISBN: 978-3-642-07716-6, 2003
2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
2000
Comput. Commun., 2000
1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
1998
Comparing lower bounds on messages and rounds for two classes of key establishment protocols.
Comput. Commun. Rev., 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998