Nisha Panwar
Orcid: 0000-0002-7179-5213
According to our database1,
Nisha Panwar
authored at least 34 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
2
2
3
1
2
2
2
2
3
1
1
2
4
3
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases.
IEEE Trans. Dependable Secur. Comput., 2024
2023
Proc. VLDB Endow., 2023
Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data.
IACR Cryptol. ePrint Arch., 2023
2022
Quest: Privacy-Preserving Monitoring of Network Data: A System for Organizational Response to Pandemics.
IEEE Trans. Serv. Comput., 2022
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data.
IEEE Trans. Knowl. Data Eng., 2022
ACM Trans. Internet Things, 2022
Proceedings of the IEEE World Congress on Services, 2022
2021
CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes.
ACM Trans. Cyber Phys. Syst., 2021
Integrity Verification for Streaming IoT Applications with a Minimalist Logging Scheme.
Proceedings of the IEEE International Conference on Smart Computing, 2021
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021
2020
Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets.
CoRR, 2020
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version.
CoRR, 2020
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Proc. VLDB Endow., 2019
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019
Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
CoRR, 2018
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018
Proceedings of the 3rd International Conference on Internet of Things, 2018
2017
The excessive power of <i>Ctrl</i>+<i>C</i> and <i>Ctrl</i>+<i>V</i> in CS research and career development.
XRDS, 2017
2016
Wirel. Networks, 2016
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016
2015
2013
Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond.
Proceedings of the SAFECOMP 2013, 2013