Roopa Vishwanathan

Orcid: 0009-0008-6954-052X

According to our database1, Roopa Vishwanathan authored at least 28 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SPRITE: Secure and Private Routing in Payment Channel Networks.
IACR Cryptol. ePrint Arch., 2024

SoK: Payment Channel Networks.
CoRR, 2024

PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edge.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

RACED: Routing in Payment Channel Networks Using Distributed Hash Tables.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Auroch: Auction-Based Multipath Routing for Payment Channel Networks.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2022
FIRST: FrontrunnIng Resilient Smart ConTracts.
CoRR, 2022

Private and Secure Smart Meter Billing.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

2021
ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems.
IACR Cryptol. ePrint Arch., 2021

Off-chain Execution and Verification of Computationally Intensive Smart Contracts.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

APECS: A Distributed Access Control Framework for Pervasive Edge Computing Services.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

SoK: Money Laundering in Cryptocurrencies.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Balance Transfers and Bailouts in Credit Networks using Blockchains.
CoRR, 2020

Balance Transfers and Bailouts in Credit Networks using Blockchains<sup>*</sup>.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

2019
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks.
IACR Cryptol. ePrint Arch., 2019

Rebalancing in Acyclic Payment Networks.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Exploring Automation in Proofs of Attribute-based Encryption in the Standard Model.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Private and Secure Mixing in Credit Networks.
Proceedings of the 2019 International Electronics Communication Conference, 2019

SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
New Techniques for Public Key Encryption with Sender Recovery.
IACR Cryptol. ePrint Arch., 2018

Automated Proofs of Signatures using Bilinear Pairings.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Attribute Based Signatures: The Case for Automation.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2015
Expiration and Revocation of Keys for Attribute-based Signatures.
IACR Cryptol. ePrint Arch., 2015

2013
Encrypted Secret Sharing and Analysis by Plaintext Randomization.
IACR Cryptol. ePrint Arch., 2013

Multi-user dynamic proofs of data possession using trusted hardware.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2011
General Secure Function Evaluation using standard trusted computing hardware.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

2010
Privacy Preserving Group Nearest Neighbour Queries in Location-Based Services Using Cryptographic Techniques.
Proceedings of the Global Communications Conference, 2010

2009
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology.
IACR Cryptol. ePrint Arch., 2009

A two-level protocol to answer private location-based queries.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009


  Loading...