Gaurav Pareek
Orcid: 0000-0001-7241-7778
According to our database1,
Gaurav Pareek
authored at least 18 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage.
Proceedings of the Distributed Computing and Intelligent Technology, 2024
2023
Concurr. Comput. Pract. Exp., 2023
2021
TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications.
J. Ambient Intell. Humaniz. Comput., 2021
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage.
J. Inf. Secur. Appl., 2021
Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets.
J. Inf. Secur. Appl., 2021
Int. J. Inf. Comput. Secur., 2021
2020
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance.
J. Inf. Secur. Appl., 2020
2019
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019
2018
Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud.
Proceedings of the Information Systems Security - 14th International Conference, 2018
2017
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model.
Proceedings of the 2017 International Conference on Advances in Computing, 2017
2016
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
2014
Proceedings of the Intelligent Distributed Computing, 2014
Proceedings of the Intelligent Distributed Computing, 2014