Anish Mathuria
  According to our database1,
  Anish Mathuria
  authored at least 39 papers
  between 1998 and 2022.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2022
    IACR Cryptol. ePrint Arch., 2022
    
  
  2021
    Proceedings of the Information Systems Security - 17th International Conference, 2021
    
  
  2020
    Information Security and Cryptography, Springer, ISBN: 978-3-662-58145-2, 2020
    
  
    Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
    
  
HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption.
    
  
    Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020
    
  
  2019
    Cybersecur., 2019
    
  
Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements.
    
  
    Proceedings of the Information Systems Security - 15th International Conference, 2019
    
  
  2018
    Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
    
  
    Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018
    
  
  2017
    Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
    
  
    Proceedings of the 10th International Conference on Security of Information and Networks, 2017
    
  
    Proceedings of the Information Systems Security - 13th International Conference, 2017
    
  
    Proceedings of the 18th International Conference on Distributed Computing and Networking, 2017
    
  
    Proceedings of the Research Advances in Cloud Computing, 2017
    
  
  2016
    Proceedings of the Eighth IEEE International Conference on Technology for Education, 2016
    
  
  2015
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System.
    
  
    Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
    
  
    Proceedings of the Security in Computing and Communications, 2015
    
  
    Proceedings of the Information Systems Security - 11th International Conference, 2015
    
  
Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network.
    
  
    Proceedings of the Information Systems Security - 11th International Conference, 2015
    
  
  2014
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13.
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
    Proceedings of the Information Systems Security - 10th International Conference, 2014
    
  
  2013
    Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
    
  
    Proceedings of the Information Systems Security - 9th International Conference, 2013
    
  
    Proceedings of the 6th ACM India Computing Convention, 2013
    
  
  2012
    Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012
    
  
    Proceedings of the Information Systems Security, 8th International Conference, 2012
    
  
Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation.
    
  
    Proceedings of the Distributed Computing and Internet Technology, 2012
    
  
  2008
  2007
    Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
    
  
  2006
    Proceedings of the Information Systems Security, Second International Conference, 2006
    
  
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
    
  
    Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
    
  
  2005
  2004
    Proceedings of the High Performance Computing, 2004
    
  
  2003
    Information Security and Cryptography, Springer, ISBN: 978-3-642-07716-6, 2003
    
  
  2002
    Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
    
  
  2000
    Comput. Commun., 2000
    
  
  1999
    Proceedings of the Information and Communication Security, Second International Conference, 1999
    
  
  1998
Comparing lower bounds on messages and rounds for two classes of key establishment protocols.
    
  
    Comput. Commun. Rev., 1998
    
  
    Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998