Anirban Basu

According to our database1, Anirban Basu authored at least 67 papers between 1992 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Hybridization of Genetic and Group Search Optimization Algorithm for Deadline-Constrained Task Scheduling Approach.
J. Intelligent Systems, 2019

Combining genetic algorithm and pairwise testing for optimised test generation from UML ADs.
IET Software, 2019

Privacy-friendly platform for healthcare data in cloud based on blockchain environment.
Future Gener. Comput. Syst., 2019

A Framework for Blockchain-Based Verification of Integrity and Authenticity.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

2018
Integration of fuzzy DEMATEL and FMCDM approach for evaluating knowledge transfer effectiveness with reference to GSD project outcome.
Int. J. Machine Learning & Cybernetics, 2018

PPM: Privacy Policy Manager for Home Energy Management System.
JoWUA, 2018

The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

BlockStore: A Secure Decentralized Storage Framework on Blockchain.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
An integrated fuzzy DEMATEL, TOPSIS, and ELECTRE approach for evaluating knowledge transfer effectiveness with reference to GSD project outcome.
Neural Computing and Applications, 2017

Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction.
J. Internet Serv. Inf. Secur., 2017

Privacy-friendly secure bidding for smart grid demand-response.
Inf. Sci., 2017

Resource optimised workflow scheduling in Hadoop using stochastic hill climbing technique.
IET Software, 2017

MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

On blockchain-based anonymized dataset distribution platform.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Towards Outsourced Privacy-Preserving Multiparty DBSCAN.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.
Proceedings of the Advances in Information and Computer Security, 2017

VIGraph - A Framework for Verifiable Information.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

On blockchain-based authorization architecture for beyond-5G mobile services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Hypercubes and Private Information Retrieval.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

IPRES: in-device proxy re-encryption service for secure ICN.
Proceedings of the 4th ACM Conference on Information-Centric Networking, 2017

2016
Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

PrefRank: Quantification and Aggregation of Subjective User Preferences.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

User-in-a-context: A blueprint for context-aware identification.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A Model for Personalised Perception of Policies.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

2015
k-anonymity: Risks and the Reality.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Privacy-friendly secure bidding scheme for demand response in smart grid.
Proceedings of the IEEE First International Smart Cities Conference, 2015

Lightweight Practical Private One-Way Anonymous Messaging.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Practical Private One-way Anonymous Message Routing.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Proceedings of the SECRYPT 2014, 2014

From ratings to trust: an empirical study of implicit trust in recommender systems.
Proceedings of the Symposium on Applied Computing, 2014

PrefRank: fair aggregation of subjective user preferences.
Proceedings of the Symposium on Applied Computing, 2014

Privacy preserving trusted social feedback.
Proceedings of the Symposium on Applied Computing, 2014

A Privacy Risk Model for Trajectory Data.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Efficient Integrity Verification for Outsourced Collaborative Filtering.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Beyond proofs of data possession: Finding defective blocks in outsourced storage.
Proceedings of the IEEE Global Communications Conference, 2014

Key Extraction Attack Using Statistical Analysis of Memory Dump Data.
Proceedings of the Risks and Security of Internet and Systems, 2014

Data Storage on the Cloud under User Control.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

XOR network coding pollution prevention without homomorphic functions.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets.
IEICE Transactions, 2013

The state of peer-to-peer network simulators.
ACM Comput. Surv., 2013

Differentially Private Naive Bayes Classification.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Reflections on Measuring the Trust Empowerment Potential of a Digital Environment.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Privacy preserving collaborative filtering for SaaS enabling PaaS clouds.
J. Cloud Computing, 2012

Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study.
Proceedings of the ACM Symposium on Applied Computing, 2012

A concordance framework for building trust evidences.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Rendering unto Cæsar the Things That Are Cæsar's: Complex Trust Models and Human Understanding.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

2011
Deploying Pervasive Advertising in a Farmers' Market.
Proceedings of the Pervasive Advertising, 2011

Frontiers in Trust Management.
J. Internet Serv. Inf. Secur., 2011

Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor.
J. Internet Serv. Inf. Secur., 2011

Privacy-preserving Collaborative Filtering for the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
A reputation framework for behavioural history : developing and sharing reputations from behavioural history of network clients.
PhD thesis, 2010

Can We Use Trust in Online Dating?
JoWUA, 2010

Chutney and relish: designing to augment the experience of shopping at a farmers' market.
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010

Bringing the Virtual to the Farmers' Market: Designing for Trust in Pervasive Computing Systems.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

2008
The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications.
Proceedings of the Trust Management II, 2008

2007
The state of peer-to-peer simulators and simulations.
Computer Communication Review, 2007

2004
An Interactive Visualisation Interface for Virtual Museums.
Proceedings of the VAST 2004: The 5th International Symposium on Virtual Reality, 2004

ARCOLite - An XML Based System for Building and Presenting Virtual Museum Exhibitions Using Web3D and Augmented Reality.
Proceedings of the Theory and Practice of Computer Graphics 2004 (TPCG 2004), 2004

A Comprehensive Analytical Capacitance Model of a Two Dimensional Nanodot Array.
Proceedings of the 5th International Symposium on Quality of Electronic Design (ISQED 2004), 2004

Simultaneous optimization of supply and threshold voltages for low-power and high-performance circuits in the leakage dominant era.
Proceedings of the 41th Design Automation Conference, 2004

1995
PARAM 9000 and the programming environment.
Proceedings of the High-Performance Computing and Networking, 1995

1992
Performance Estimation of LU Factorisation on Message Passing Multiprocessors.
Parallel Processing Letters, 1992


  Loading...