Sweta Mishra

Orcid: 0000-0003-1240-5841

According to our database1, Sweta Mishra authored at least 16 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lightweight Authentication Scheme Based on ECC for IoT.
SN Comput. Sci., October, 2024

Ransomware Criminal Smart Contract.
Proceedings of the IEEE International Conference on Blockchain, 2024

2023
Detection of Password Reuse and Credential Stuffing: A Server-side Approach.
IACR Cryptol. ePrint Arch., 2023

A Security Analysis of Password Managers on Android.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
On Security of Fuzzy Commitment Scheme for Biometric Authentication.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach.
J. Inf. Secur. Appl., 2021

2020
Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel Bit-Wise Encryption.
IEEE Trans. Inf. Forensics Secur., 2020

2019
Generation of Secure and Reliable Honeywords, Preventing False Detection.
IEEE Trans. Dependable Secur. Comput., 2019

Cryptanalytic time-memory trade-off for password hashing schemes.
Int. J. Inf. Sec., 2019

TMPS: Ticket-Mediated Password Strengthening.
IACR Cryptol. ePrint Arch., 2019

2017
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.
IACR Cryptol. ePrint Arch., 2017

On Making U2F Protocol Leakage-Resilient via Re-keying.
IACR Cryptol. ePrint Arch., 2017

Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes.
IACR Cryptol. ePrint Arch., 2017

2015
Performance Analysis of Some Password Hashing Schemes.
IACR Cryptol. ePrint Arch., 2015

Rig: A simple, secure and flexible design for Password Hashing.
IACR Cryptol. ePrint Arch., 2015

2014
Cryptographic Module Based Approach for Password Hashing Schemes.
Proceedings of the Technology and Practice of Passwords, 2014


  Loading...