Ashish Kundu

According to our database1, Ashish Kundu authored at least 34 papers between 2004 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases.
IEEE Trans. Knowl. Data Eng., 2018

Healthcare Informatics and Privacy.
IEEE Internet Computing, 2018

A Trusted Healthcare Data Analytics Cloud Platform.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Research Directions in Blockchain Data Management and Analytics.
Proceedings of the 21th International Conference on Extending Database Technology, 2018

2017
Principle of Need-to-Act.
CoRR, 2017

Energy Attacks on Mobile Devices.
CoRR, 2017

Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress).
CoRR, 2017

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Compliance-Aware Provisioning of Containers on Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Managing sensitive applications in the public cloud.
IBM Journal of Research and Development, 2016

An Efficient Parallel Implementation of a Light-weight Data Privacy Method for Mobile Cloud Users.
Proceedings of the Seventh International Workshop on Data-Intensive Computing in the Clouds, 2016

Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2014
Towards a Systematic Study of the Covert Channel Attacks in Smartphones.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Service Usage Metering in Hybrid Cloud Environments.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Security of graph data: hashing schemes and definitions.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Use-Case Centric Dashboard for Cloud Solutions.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Privacy-preserving authentication of trees and graphs.
Int. J. Inf. Sec., 2013

Towards Authenticated Objects.
Proceedings of the Network and System Security - 7th International Conference, 2013

Network-Level Access Control Management for the Cloud.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

2012
On Hashing Graphs.
IACR Cryptology ePrint Archive, 2012

Efficient Leakage-free Authentication of Trees, Graphs and Forests.
IACR Cryptology ePrint Archive, 2012

Authentication of Data on Devices.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

Leakage-free redactable signatures.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
A New Class of Buffer Overflow Attacks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
How to authenticate graphs without leaking.
Proceedings of the EDBT 2010, 2010

2009
SN2K Attacks and Honest Services.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
A New Model for Secure Dissemination of XML Content.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2008

Structural signatures for tree data structures.
PVLDB, 2008

A tree-covering problem arising in integrity of tree-structured data.
Inf. Process. Lett., 2008

Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors.
Proceedings of the 24th International Conference on Data Engineering, 2008

2006
Secure Dissemination of XML Content Using Structure-based Routing.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

2005
A service creation environment based on end to end composition of Web services.
Proceedings of the 14th international conference on World Wide Web, 2005

Building Applications Using End to End Composition of Web Services.
Proceedings of the Proceedings, 2005

2004
An Authoring Technology for Multidevice Web Applications.
IEEE Pervasive Computing, 2004


  Loading...