B. B. Amberker

According to our database1, B. B. Amberker authored at least 57 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Dynamic group signature scheme using ideal lattices.
Int. J. Inf. Comput. Secur., 2023

2020
Lattice-based group signature scheme without random oracle.
Inf. Secur. J. A Glob. Perspect., 2020

Traceable signatures using lattices.
Int. Arab J. Inf. Technol., 2020

2017
Access control mechanisms for outsourced data in public cloud using polynomial interpolation and multilinear map.
Int. J. Cloud Comput., 2017

2015
Provably secure public key cryptosystem with limited number of encryptions for authorised sharing of outsourced data.
Int. J. Cloud Comput., 2015

Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme.
Proceedings of the Security in Computing and Communications, 2015

2014
Reversible Data Embedding for MPEG-4 Video Using Middle Frequency DCT Coefficients.
J. Inf. Hiding Multim. Signal Process., 2014

Attribute-based group signature without random oracles with attribute anonymity.
Int. J. Inf. Comput. Secur., 2014

Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model.
Int. J. Appl. Cryptogr., 2014

2013
Secure group and multi-layer group communication schemes based on polynomial interpolation.
Secur. Commun. Networks, 2013

DCT based reversible data embedding for MPEG-4 video using HVS characteristics.
J. Inf. Secur. Appl., 2013

Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation.
Int. J. Trust. Manag. Comput. Commun., 2013

A dynamic constant size attribute-based group signature scheme with attribute anonymity.
Int. J. Inf. Priv. Secur. Integr., 2013

Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud.
Int. J. Inf. Commun. Technol., 2013

Key establishment protocols for secure communication in clustered sensor networks.
Int. J. Commun. Networks Distributed Syst., 2013

On the Security of Group-based Proxy Re-encryption Scheme.
IACR Cryptol. ePrint Arch., 2013

Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2013

Efficient Hierarchical Key Management Scheme Based on Polynomial Construction.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard Model.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

BUSYEMBED: An HVS based reversible data embedding scheme for video using DCT.
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013

Provable data possession scheme with constant proof size for outsourced data in public cloud.
Proceedings of the International Conference on Advances in Computing, 2013

Secure group key management scheme based on dual receiver cryptosystem.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

2012
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images.
Proceedings of the SECRYPT 2012, 2012

A DCT based reversible data embedding scheme for MPEG-4 video using HVS characteristics.
Proceedings of the Eighth Indian Conference on Vision, Graphics and Image Processing, 2012

Access control mechanisms for outsourced data in cloud.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

2011
An efficient scheme to handle bursty behavior in secure group communication using binomial key trees.
Secur. Commun. Networks, 2011

PERSEN: power-efficient logical ring based key management for clustered sensor networks.
Int. J. Sens. Networks, 2011

Secure data collection using mobile data collector in clustered wireless sensor networks.
IET Wirel. Sens. Syst., 2011

Group key management scheme for simultaneous multiple groups with overlapped membership.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

2010
A key management scheme for secure group communication using binomial key trees.
Int. J. Netw. Manag., 2010

An improved reversible steganography scheme based on dual cover images.
Int. J. Multim. Intell. Secur., 2010

Steganographic Scheme for Gray-Level Image Using Pixel Neighborhood and LSB Substitution.
Int. J. Image Graph., 2010

SEEDA: Secure end-to-end data aggregation in Wireless Sensor Networks.
Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, 2010

Estimating the embedding capacity of a color image using Color Difference.
Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, 2010

Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Secure data collection in Sensor Networks using tree based key management scheme and secret sharing.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

2009
Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution
CoRR, 2009

Analysis of Key Management Schemes for Secure Group Communication and Their Classification.
J. Comput. Inf. Technol., 2009

Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks.
Proceedings of the Contemporary Computing - Second International Conference, 2009

An energy efficient deterministic key establishment scheme for clustered Wireless Sensor Networks.
Proceedings of the 16th International Conference on High Performance Computing, 2009

2008
Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers.
Proceedings of the SECRYPT 2008, 2008

New group key computation technique for secure group communication.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Distributed Key Management Technique for Reliable Secure Group Communication.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

A Secure Group Key Management Scheme for Sensor Networks.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Authenticated Secure Group Communication using Broadcast Encryption Key Computation.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

A New Approach to Securing Broadcast Data in Sensor Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A new method of verifying digital signatures in e-cheque processing.
Proceedings of the 16th International Conference on Networks, 2008

Tree-based key management scheme for heterogeneous sensor networks.
Proceedings of the 16th International Conference on Networks, 2008

Proxy Re-signature Schemes.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Forward-Secure Multi-signatures.
Proceedings of the Distributed Computing and Internet Technology, 2008

Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Secure e-Cheque Clearance between Financial Institutions.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

Controlled Delegation in e-cheques Using Proxy Signatures.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007


  Loading...