Praveen Gauravaram
Orcid: 0000-0001-9135-2930Affiliations:
- Tata Consultancy Services, Brisbane, Australia
- Queensland University of Technology, Brisbane, Australia
According to our database1,
Praveen Gauravaram
authored at least 61 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.
Cryptogr., March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems.
Comput. Secur., 2024
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies.
IEEE Access, 2024
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports.
IEEE Trans. Intell. Transp. Syst., February, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis.
CoRR, 2023
IEEE Access, 2023
2022
Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures.
CoRR, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the S3@MobiCom 2022: Proceedings of the 13th ACM Wireless of the Students, 2022
2021
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments.
Proceedings of the 20th IEEE International Conference on Trust, 2021
2020
IEEE Access, 2020
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020
Proceedings of the Applications and Techniques in Information Security, 2020
2019
J. Parallel Distributed Comput., 2019
2018
Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Search over Compute: Solving Multiplication-Intensive Computational Problems over FHE Data.
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018
2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
Performance Analysis of Sorting of FHE Data: Integer-Wise Comparison vs Bit-Wise Comparison.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Des. Codes Cryptogr., 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014
2013
Proceedings of the Radio Frequency Identification, 2013
Proceedings of the Radio Frequency Identification, 2013
2012
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis.
Int. J. Inf. Sec., 2012
2011
Proceedings of the Encyclopedia of Information Assurance, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
Proceedings of the Progress in Cryptology, 2010
2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
2008
Int. J. Netw. Secur., 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks.
Proceedings of the Topics in Cryptology, 2008
2007
IACR Cryptol. ePrint Arch., 2007
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions.
Proceedings of the Progress in Cryptology, 2007
2006
The legal and practical implications of recent attacks on 128-bit cryptographic hash functions.
First Monday, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
2004
IEICE Electron. Express, 2004
CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE).
Proceedings of the Cryptographic Algorithms and their Uses, 2004