Raghav Bhaskar

According to our database1, Raghav Bhaskar authored at least 25 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Data Level Privacy Preserving: A Stochastic Perturbation Approach Based on Differential Privacy (Extended abstract).
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

2023
Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures.
IEEE Trans. Knowl. Data Eng., August, 2023

Data Level Privacy Preserving: A Stochastic Perturbation Approach Based on Differential Privacy.
IEEE Trans. Knowl. Data Eng., April, 2023

2022
Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure.
CoRR, 2022

Privacy risk quantification in education data using Markov model.
Br. J. Educ. Technol., 2022

2021
Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants.
CoRR, 2021

On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Privacy Preserving Text Data Encoding and Topic Modelling.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2019
On Inferring Training Data Attributes in Machine Learning Models.
CoRR, 2019

2013
Verito: A Practical System for Transparency and Accountability in Virtual Economies.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
On the (In)security of Fischlin's Paradigm.
IACR Cryptol. ePrint Arch., 2012

Non Observability in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2012

Congestion lower bounds for secure in-network aggregation.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

2011
Noiseless Database Privacy.
IACR Cryptol. ePrint Arch., 2011

2010
Discovering frequent patterns in sensitive data.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

2008
On The Diffie-Hellman Assumption.
IACR Cryptol. ePrint Arch., 2008

Improved Bounds on Security Reductions for Discrete Log Based Signatures.
Proceedings of the Advances in Cryptology, 2008

2007
A three round authenticated group key agreement protocol for ad hoc networks.
Pervasive Mob. Comput., 2007

Aggregate designated verifier signatures and application to secure routing.
Int. J. Secur. Networks, 2007

Vulnerabilities in Anonymous Credential Systems.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

2006
Etude cryptographique de solution de sécurité pour les environnements distribués sans fil. Application au projet azone. (Cryptographic study of security solutons for wireless distributed networks application to the azote project).
PhD thesis, 2006

Efficient and Dynamic Group Key Agreement in Ad hoc Networks
CoRR, 2006

Efficient Authentication for Reactive Routing Protocols.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
An Efficient Group Key Agreement Protocol for Ad Hoc Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

2003
Efficient galois field arithmetic on SIMD architectures.
Proceedings of the SPAA 2003: Proceedings of the Fifteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2003


  Loading...