Ashish Kundu

According to our database1, Ashish Kundu authored at least 42 papers between 2004 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 




Similarities and Learnings from Ancient Literature on Blockchain Consensus and Integrity.
CoRR, 2020

Data Transparency with Blockchain and AI Ethics.
ACM J. Data Inf. Qual., 2019

Towards Deep Federated Defenses Against Malware in Cloud Ecosystems.
CoRR, 2019

Uncheatable Machine Learning Inference.
CoRR, 2019

StackVault: Protection from Untrusted Functions.
CoRR, 2019

PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.
Proceedings of the World Wide Web Conference, 2019

How Secure Is Your IoT Network?
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases.
IEEE Trans. Knowl. Data Eng., 2018

Healthcare Informatics and Privacy.
IEEE Internet Comput., 2018

A Trusted Healthcare Data Analytics Cloud Platform.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Research Directions in Blockchain Data Management and Analytics.
Proceedings of the 21st International Conference on Extending Database Technology, 2018

Collaborative and Accountable Hardware Governance Using Blockchain.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Principle of Need-to-Act.
CoRR, 2017

Energy Attacks on Mobile Devices.
CoRR, 2017

Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress).
CoRR, 2017

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Compliance-Aware Provisioning of Containers on Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Managing sensitive applications in the public cloud.
IBM J. Res. Dev., 2016

An Efficient Parallel Implementation of a Light-weight Data Privacy Method for Mobile Cloud Users.
Proceedings of the Seventh International Workshop on Data-Intensive Computing in the Clouds, 2016

Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Towards a Systematic Study of the Covert Channel Attacks in Smartphones.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Service Usage Metering in Hybrid Cloud Environments.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Security of graph data: hashing schemes and definitions.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Use-Case Centric Dashboard for Cloud Solutions.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

Privacy-preserving authentication of trees and graphs.
Int. J. Inf. Sec., 2013

Towards Authenticated Objects.
Proceedings of the Network and System Security - 7th International Conference, 2013

Network-Level Access Control Management for the Cloud.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

On Hashing Graphs.
IACR Cryptol. ePrint Arch., 2012

Efficient Leakage-free Authentication of Trees, Graphs and Forests.
IACR Cryptol. ePrint Arch., 2012

Authentication of Data on Devices.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

Leakage-free redactable signatures.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

A New Class of Buffer Overflow Attacks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

How to authenticate graphs without leaking.
Proceedings of the EDBT 2010, 2010

SN2K Attacks and Honest Services.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

A New Model for Secure Dissemination of XML Content.
IEEE Trans. Syst. Man Cybern. Part C, 2008

Structural signatures for tree data structures.
Proc. VLDB Endow., 2008

A tree-covering problem arising in integrity of tree-structured data.
Inf. Process. Lett., 2008

Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors.
Proceedings of the 24th International Conference on Data Engineering, 2008

Secure Dissemination of XML Content Using Structure-based Routing.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

A service creation environment based on end to end composition of Web services.
Proceedings of the 14th international conference on World Wide Web, 2005

Building Applications Using End to End Composition of Web Services.
Proceedings of the Proceedings, 2005

An Authoring Technology for Multidevice Web Applications.
IEEE Pervasive Comput., 2004