B. B. Amberker
According to our database1,
B. B. Amberker
authored at least 58 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Int. J. Inf. Comput. Secur., 2023
2020
Inf. Secur. J. A Glob. Perspect., 2020
2017
Access control mechanisms for outsourced data in public cloud using polynomial interpolation and multilinear map.
Int. J. Cloud Comput., 2017
2015
Provably secure public key cryptosystem with limited number of encryptions for authorised sharing of outsourced data.
Int. J. Cloud Comput., 2015
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme.
Proceedings of the Security in Computing and Communications, 2015
2014
J. Inf. Hiding Multim. Signal Process., 2014
Int. J. Inf. Comput. Secur., 2014
Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model.
Int. J. Appl. Cryptogr., 2014
2013
Secure group and multi-layer group communication schemes based on polynomial interpolation.
Secur. Commun. Networks, 2013
J. Inf. Secur. Appl., 2013
Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation.
Int. J. Trust. Manag. Comput. Commun., 2013
A dynamic constant size attribute-based group signature scheme with attribute anonymity.
Int. J. Inf. Priv. Secur. Integr., 2013
Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud.
Int. J. Inf. Commun. Technol., 2013
Int. J. Commun. Networks Distributed Syst., 2013
IACR Cryptol. ePrint Arch., 2013
Ad Hoc Sens. Wirel. Networks, 2013
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity.
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard Model.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013
Provable data possession scheme with constant proof size for outsourced data in public cloud.
Proceedings of the International Conference on Advances in Computing, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
2012
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images.
Proceedings of the SECRYPT 2012, 2012
A DCT based reversible data embedding scheme for MPEG-4 video using HVS characteristics.
Proceedings of the Eighth Indian Conference on Vision, Graphics and Image Processing, 2012
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012
2011
An efficient scheme to handle bursty behavior in secure group communication using binomial key trees.
Secur. Commun. Networks, 2011
PERSEN: power-efficient logical ring based key management for clustered sensor networks.
Int. J. Sens. Networks, 2011
Secure data collection using mobile data collector in clustered wireless sensor networks.
IET Wirel. Sens. Syst., 2011
Group key management scheme for simultaneous multiple groups with overlapped membership.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011
2010
Int. J. Netw. Manag., 2010
Int. J. Multim. Intell. Secur., 2010
Steganographic Scheme for Gray-Level Image Using Pixel Neighborhood and LSB Substitution.
Int. J. Image Graph., 2010
An Efficient and Secured non blind Watermarking Scheme for Color Images using DWT and Arnold transform.
Int. J. Comput., 2010
Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, 2010
Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, 2010
Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme.
Proceedings of the Recent Trends in Network Security and Applications, 2010
Secure data collection in Sensor Networks using tree based key management scheme and secret sharing.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010
2009
Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution
CoRR, 2009
Analysis of Key Management Schemes for Secure Group Communication and Their Classification.
J. Comput. Inf. Technol., 2009
Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks.
Proceedings of the Contemporary Computing - Second International Conference, 2009
An energy efficient deterministic key establishment scheme for clustered Wireless Sensor Networks.
Proceedings of the 16th International Conference on High Performance Computing, 2009
2008
Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 16th International Conference on Networks, 2008
Proceedings of the 16th International Conference on Networks, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Distributed Computing and Internet Technology, 2008
Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008
2007
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007