Anish Mathuria

According to our database1, Anish Mathuria authored at least 39 papers between 1998 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient privacy preserving top-k recommendation using homomorphic sorting.
IACR Cryptol. ePrint Arch., 2022

2021
Faster Private Rating Update via Integer-Based Homomorphic Encryption.
Proceedings of the Information Systems Security - 17th International Conference, 2021

2020
Protocols for Authentication and Key Establishment, Second Edition
Information Security and Cryptography, Springer, ISBN: 978-3-662-58145-2, 2020

Automatic Generation of Compact Printable Shellcodes for x86.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

2019
Comprehensive evaluation of key management hierarchies for outsourced data.
Cybersecur., 2019

Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements.
Proceedings of the Information Systems Security - 15th International Conference, 2019

2018
An Enhanced Privacy-Preserving Recommender System.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Fast Private License Plate Matching Using Symmetric Homomorphic Encryption.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
Efficient Implementation of Private License Plate Matching Protocols.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017

Feasibility of idle port scanning using RST rate-limit.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

On Automated Detection of Multi-Protocol Attacks Using AVISPA.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Improved Write Access Control and Stronger Freshness Guarantee to Outsourced Data.
Proceedings of the 18th International Conference on Distributed Computing and Networking, 2017

Security and Privacy Issues in Outsourced Personal Health Record.
Proceedings of the Research Advances in Cloud Computing, 2017

2016
A Tool for Visualizing Concurrent C Programs Using Graphs.
Proceedings of the Eighth IEEE International Conference on Technology for Education, 2016

2015
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud.
Proceedings of the Security in Computing and Communications, 2015

On Anonymous Attribute Based Encryption.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network.
Proceedings of the Information Systems Security - 11th International Conference, 2015

2014
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13.
IACR Cryptol. ePrint Arch., 2014

Automatic Generation of Compact Alphanumeric Shellcodes for x86.
Proceedings of the Information Systems Security - 10th International Conference, 2014

2013
Alphanumeric Shellcode Generator for ARM Architecture.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper).
Proceedings of the Information Systems Security - 9th International Conference, 2013

Improving security and efficiency of time-bound access to outsourced data.
Proceedings of the 6th ACM India Computing Convention, 2013

2012
Towards Formal Analysis of Key Control in Group Key Agreement Protocols.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012

A Novel Key Update Protocol in Mobile Sensor Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation.
Proceedings of the Distributed Computing and Internet Technology, 2012

2008
New attacks on ISO key establishment protocols.
IACR Cryptol. ePrint Arch., 2008

2007
Analysis and Enhancement of Two Key Agreement Protocols for Wireless Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2006
An Efficient Key Assignment Scheme for Access Control in a Hierarchy.
Proceedings of the Information Systems Security, Second International Conference, 2006

An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
On Efficient Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2005

2004
Efficient Secure Aggregation in Sensor Networks.
Proceedings of the High Performance Computing, 2004

2003
Protocols for Authentication and Key Establishment
Information Security and Cryptography, Springer, ISBN: 978-3-642-07716-6, 2003

2002
Using a Formal Technique for Protocol Idealization: A Cautionary Note.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2000
Key establishment protocols for secure mobile communications: a critical survey.
Comput. Commun., 2000

1999
An Extended Logic for Analyzing Timed-Release Public-Key Protocols.
Proceedings of the Information and Communication Security, Second International Conference, 1999

1998
Comparing lower bounds on messages and rounds for two classes of key establishment protocols.
Comput. Commun. Rev., 1998

Key Establishment Protocols for Secure Mobile Communications: A Selective Survey.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...