Amitabh Saxena

According to our database1, Amitabh Saxena
  • authored at least 34 papers between 2003 and 2016.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
JDQL: A framework for Java Static Analysis.
Proceedings of the 9th India Software Engineering Conference, 2016

Shifting testing beyond the deployment boundary.
Proceedings of the International Workshop on Continuous Software Evolution and Delivery, 2016

2015
Application Layer Encryption for Cloud.
Proceedings of the 2015 Asia-Pacific Software Engineering Conference, 2015

Data Vaporizer - Towards a Configurable Enterprise Data Storage Framework in Public Cloud.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Increasing Anonymity in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Detecting SOQL-injection vulnerabilities in SalesForce applications.
Proceedings of the International Conference on Advances in Computing, 2013

2010
Secure Computation with Fixed-Point Numbers.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks.
Proceedings of the Communications and Multimedia Security, 2010

2009
A cryptographic primitive based on hidden-order groups.
J. Mathematical Cryptology, 2009

A Secure Wireless Routing Protocol Using Enhanced Chain Signatures
CoRR, 2009

Towards a Theory of White-Box Security.
Proceedings of the Emerging Challenges for Security, 2009

Towards Security Notions for White-Box Cryptography.
Proceedings of the Information Security, 12th International Conference, 2009

2008
Enforcing and defying associativity, commutativity, totality, and strong noninvertibility for worst-case one-way functions.
Theor. Comput. Sci., 2008

One-Way Signature Chaining: a new paradigm for group cryptosystems.
IJICS, 2008

White-Box Cryptography: Formal Notions and (Im)possibility Results.
IACR Cryptology ePrint Archive, 2008

Towards a Theory of White-Box Security.
IACR Cryptology ePrint Archive, 2008

On White-box Cryptography and Obfuscation.
CoRR, 2008

2007
Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs.
Proceedings of the SECRYPT 2007, 2007

2006
A New Cryptosystem Based On Hidden Order Groups.
IACR Cryptology ePrint Archive, 2006

A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement.
IACR Cryptology ePrint Archive, 2006

A New Cryptosystem Based On Hidden Order Groups
CoRR, 2006

Pairing Based Cryptography For Distributed And Grid Computing.
Proceedings of IEEE International Conference on Communications, 2006

2005
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems.
IACR Cryptology ePrint Archive, 2005

An Authentication Protocol For Mobile Agents Using Bilinear Pairings.
IACR Cryptology ePrint Archive, 2005

Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings.
IACR Cryptology ePrint Archive, 2005

Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs.
IACR Cryptology ePrint Archive, 2005

Enforcing and Defying Associativity, Commutativity, Totality, and Strong Noninvertibility for One-Way Functions in Complexity Theory
CoRR, 2005

A novel method for authenticating mobile agents with one-way signature chaining.
Proceedings of the 2005 International Symposium on Autonomous Decentralized Systems, 2005

Enforcing and Defying Associativity, Commutativity, Totality, and Strong Noninvertibility for One-Way Functions in Complexity Theory.
Proceedings of the Theoretical Computer Science, 9th Italian Conference, 2005

Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

A Digital Cash Protocol Based on Additive Zero Knowledge.
Proceedings of the Computational Science and Its Applications, 2005

Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2003
Contributory approaches to centralized key agreement in dynamic peer groups.
Proceedings of the 11th IEEE International Conference on Networks, 2003

A new paradigm for group cryptosystems using quick keys.
Proceedings of the 11th IEEE International Conference on Networks, 2003


  Loading...