B. R. Purushothama
Orcid: 0000-0002-6252-2416Affiliations:
- National Institute of Technology Goa, India
According to our database1,
B. R. Purushothama
authored at least 53 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
DenseNet-121 Model for Diagnosis of COVID-19 Using Nearest Neighbour Interpolation and Adam Optimizer.
Wirel. Pers. Commun., August, 2024
EPREKM: ElGamal proxy re-encryption-based key management scheme with constant rekeying cost and linear public bulletin size.
Concurr. Comput. Pract. Exp., June, 2024
A lightweight group key management scheme with constant rekeying cost and public bulletin size.
Inf. Secur. J. A Glob. Perspect., March, 2024
Wirel. Pers. Commun., February, 2024
Int. J. Inf. Comput. Secur., 2024
A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage.
Proceedings of the Distributed Computing and Intelligent Technology, 2024
2023
J. Inf. Secur. Appl., September, 2023
Diagnosis of Coronavirus Disease From Chest X-Ray Images Using DenseNet-169 Architecture.
SN Comput. Sci., May, 2023
Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server.
Int. J. Internet Protoc. Technol., 2023
2022
QC-PRE: quorum controlled proxy re-encryption scheme for access control enforcement delegation of outsourced data.
Int. J. Inf. Comput. Secur., 2022
BP-MGKM: An efficient multi-group key management scheme based on bivariate polynomial.
Comput. Networks, 2022
2021
Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game.
SN Comput. Sci., 2021
TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications.
J. Ambient Intell. Humaniz. Comput., 2021
J. Inf. Secur. Appl., 2021
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage.
J. Inf. Secur. Appl., 2021
Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets.
J. Inf. Secur. Appl., 2021
Int. J. Inf. Comput. Secur., 2021
Pixel co-ordinate-based secret image sharing scheme with constant size shadow images.
Comput. Electr. Eng., 2021
2020
Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks.
J. Inf. Secur. Appl., 2020
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance.
J. Inf. Secur. Appl., 2020
Inf. Secur. J. A Glob. Perspect., 2020
2019
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019
RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication.
Proceedings of the Distributed Computing and Internet Technology, 2019
2018
Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud.
Proceedings of the Information Systems Security - 14th International Conference, 2018
2017
Access control mechanisms for outsourced data in public cloud using polynomial interpolation and multilinear map.
Int. J. Cloud Comput., 2017
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Security analysis of group key management schemes of wireless sensor network under active outsider adversary model.
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model.
Proceedings of the 2017 International Conference on Advances in Computing, 2017
2016
Secur. Commun. Networks, 2016
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
2015
Provably secure public key cryptosystem with limited number of encryptions for authorised sharing of outsourced data.
Int. J. Cloud Comput., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015
Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing.
Proceedings of the Security in Computing and Communications, 2015
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme.
Proceedings of the Security in Computing and Communications, 2015
Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model.
Proceedings of the 2015 International Conference on Advances in Computing, 2015
2013
Secure group and multi-layer group communication schemes based on polynomial interpolation.
Secur. Commun. Networks, 2013
Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation.
Int. J. Trust. Manag. Comput. Commun., 2013
Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud.
Int. J. Inf. Commun. Technol., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Provable data possession scheme with constant proof size for outsourced data in public cloud.
Proceedings of the International Conference on Advances in Computing, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
2012
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012
2011
Group key management scheme for simultaneous multiple groups with overlapped membership.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011
2009
Design and Implementation of Secure Internet Based Voting System with User Anonymity Using Identity Based Encryption System.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009