Himanshu Khurana

According to our database1, Himanshu Khurana authored at least 36 papers between 2000 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Next-Generation Access Control for Distributed Control Systems.
IEEE Internet Comput., 2016

2015
Seclius: An Information Flow-Based, Consequence-Centric Security Metric.
IEEE Trans. Parallel Distributed Syst., 2015

Implementing Cyber Security Requirements and Mechanisms in Microgrids.
Proceedings of the Critical Infrastructure Protection IX, 2015

A Cyber Security Architecture for Microgrid Deployments.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
RRE: A Game-Theoretic Intrusion Response and Recovery Engine.
IEEE Trans. Parallel Distributed Syst., 2014

Designed-in Security for Cyber-Physical Systems.
IEEE Secur. Priv., 2014

2010
An Authenticated Control Framework for Distributed Voltage Support on the Smart Grid.
IEEE Trans. Smart Grid, 2010

Attribute-Based Messaging: Access Control and Confidentiality.
ACM Trans. Inf. Syst. Secur., 2010

Smart-Grid Security Issues.
IEEE Secur. Priv., 2010

LENS: Location-based emergency notification service.
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010

MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2009

Time Valid One-Time Signature for Time-Critical Multicast Data Authentication.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Palantir: a framework for collaborative incident response and investigation.
Proceedings of the IDtrust 2009, 2009

Usable secure mailing lists with untrusted servers.
Proceedings of the IDtrust 2009, 2009

PBES: a policy based encryption system with application to data sharing in the power grid.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Towards A Taxonomy Of Attacks Against Energy Control Systems.
Proceedings of the Critical Infrastructure Protection II, 2008

2007
DLPKH - Distributed Logical Public-Key Hierarchy.
Proceedings of the Information Systems Security, Third International Conference, 2007

Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems.
Proceedings of the Third International Conference on e-Science and Grid Computing, 2007

2006
Scalable Security and Accounting Services for Content-Based Publish/Subscribe Systems.
Int. J. E Bus. Res., 2006

Mithril: Adaptable Security for Survivability in Collaborative Computing Sites.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Operational Security Requirements for Large Collaborative Compute Infrastructures.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Certified mailing lists.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Using Attribute-Based Access Control to Enable Attribute-Based Messaging.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
SELS: a secure e-mail list service.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Scalable security and accounting services for content-based publish/subscribe systems.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Administering Access Control in Dynamic Coalitions.
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005

Scalable Group Key Management with Partially Trusted Controllers.
Proceedings of the Networking, 2005

2004
A Model for Access Negotiations in Dynamic Coalitions.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

2003
Integrated Security Services for Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Reasoning about Joint Administration of Access Policies for Coalition Resources.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
On the Negotiation of Access Control Policies.
Proceedings of the Security Protocols, 2001

2000
Review and Revocation of Access Privileges Distributed with PKI Certificates.
Proceedings of the Security Protocols, 2000


  Loading...