Abhishek Parakh

According to our database1, Abhishek Parakh authored at least 53 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Framework for an Intelligent Adaptive Education Platform for Quantum Cybersecurity.
Proceedings of the IEEE Frontiers in Education Conference, 2023

Embedding a Problem Graph into Serious Games for Efficient Traversal Through Game Space.
Proceedings of the IEEE Frontiers in Education Conference, 2023

2022
Quantum internet.
Ubiquity, 2022

Anonymous voting scheme using quantum assisted blockchain.
CoRR, 2022

A Framework for Incorporating Serious Games into Learning Object Repositories through Experiential Learning.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Quantum Teleportation with One Classical Bit.
CoRR, 2021

2020
A Novel Approach for Embedding and Traversing Problems in Serious Games.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Learning Objects Based Adaptive Textbooks with Dynamic Traversal for Quantum Cryptography.
Proceedings of the Second International Workshop on Intelligent Textbooks 2020 co-located with 21st International Conference on Artificial Intelligence in Education (AIED 2020), 2020

2019
An Approach Towards Designing Problem Networks in Serious Games.
Proceedings of the IEEE Conference on Games, 2019

2018
Analyzing and Predicting Player Performance in a Quantum Cryptography Serious Game.
Proceedings of the Games and Learning Alliance - 7th International Conference, 2018

2017
Comparison of a quantum random number generator with pseudorandom number generators for their use in molecular Monte Carlo simulations.
J. Comput. Chem., 2017

Introduction to the Special Section on Challenges and Solutions in Mobile Systems Security.
Comput. Electr. Eng., 2017

QuaSim: A virtual quantum cryptography educator.
Proceedings of the IEEE International Conference on Electro Information Technology, 2017

2016
A quantum Diffie-Hellman protocol.
Int. J. Secur. Networks, 2016

Improving efficiency of quantum key distribution with probabilistic measurements.
Int. J. Secur. Networks, 2016

Asynchronous Operations on Qubits in Distributed Simulation Environments using QooSim.
CoRR, 2016

Correcting rotational errors in three stage QKD.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Linear Cryptanalysis of Quasigroup Block Cipher.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Cheating Resistant Implicit Security.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

Towards a New Quasigroup Block Cipher for a Single-Chip FPGA Implementation.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

New protocol for quantum public key cryptography.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

Quantifying the security of a QKD protocol.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

2014
Hardware Implementation of Quasigroup Encryption for SCADA Networks.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

Improving the efficiency of entanglement based quantum key exchange.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A quantum Diffie-Hellman protocol using commuting transformations.
Proceedings of the 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2014

Limits on detecting eavesdropper in QKD protocols.
Proceedings of the 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2014

Cryptanalysis of the Quasigroup Block Cipher.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
An Efficient Quasigroup Block Cipher.
Wirel. Pers. Commun., 2013

A probabilistic quantum key transfer protocol.
Secur. Commun. Networks, 2013

sEncrypt: An Encryption Algorithm Inspired from Biological Processes.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Privacy Preserving Computations Using Implicit Security.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
A Quasigroup Based Random Number Generator for Resource Constrained Environments.
IACR Cryptol. ePrint Arch., 2012

Efficient Quasigroup Block Cipher for Sensor Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Communication Efficient Oblivious Transfer Using Elliptic Curves.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

2011
Space efficient secret sharing for implicit data security.
Inf. Sci., 2011

A New Small World Lattice.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Matrix based key agreement algorithms for sensor networks.
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011

2010
Internet Voting Protocol Based on Improved Implicit Security.
Cryptologia, 2010

Recursive Secret Sharing for Distributed Storage and Information Hiding
CoRR, 2010

A Key Distribution Scheme for Sensor Networks Using Structured Graphs
CoRR, 2010

A Tree Based Recursive Information Hiding Scheme.
Proceedings of IEEE International Conference on Communications, 2010

2009
Online data storage using implicit security.
Inf. Sci., 2009

A Tree Based Recursive Scheme for Space Efficient Secret Sharing.
IACR Cryptol. ePrint Arch., 2009

Space Efficient Secret Sharing: A Recursive Approach.
IACR Cryptol. ePrint Arch., 2009

Space Efficient Secret Sharing.
CoRR, 2009

A Distributed Data Storage Scheme for Sensor Networks.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

2008
A Recursive Threshold Visual Cryptography Scheme.
IACR Cryptol. ePrint Arch., 2008

Oblivious Transfer Based on Key Exchange.
Cryptologia, 2008

Internet Voting Protocol Based on Implicit Data Security.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

2007
How to improve security in electronic voting?
Ubiquity, 2007

Oblivious Transfer Using Elliptic Curves.
Cryptologia, 2007

2006
A d-Sequence based Recursive Random Number Generator.
IACR Cryptol. ePrint Arch., 2006

Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric Oblivious Key Exchange
CoRR, 2006


  Loading...