B. R. Purushothama

Orcid: 0000-0002-6252-2416

Affiliations:
  • National Institute of Technology Goa, India


According to our database1, B. R. Purushothama authored at least 51 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A lightweight group key management scheme with constant rekeying cost and public bulletin size.
Inf. Secur. J. A Glob. Perspect., March, 2024

Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model.
Wirel. Pers. Commun., February, 2024

User driven general framework to cap the joins in secure group communication.
Int. J. Inf. Comput. Secur., 2024

A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage.
Proceedings of the Distributed Computing and Intelligent Technology, 2024

2023
Generalization of multicast encryption for Internet of Things deployment.
J. Inf. Secur. Appl., September, 2023

Diagnosis of Coronavirus Disease From Chest X-Ray Images Using DenseNet-169 Architecture.
SN Comput. Sci., May, 2023

Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server.
Int. J. Internet Protoc. Technol., 2023

2022
QC-PRE: quorum controlled proxy re-encryption scheme for access control enforcement delegation of outsourced data.
Int. J. Inf. Comput. Secur., 2022

BP-MGKM: An efficient multi-group key management scheme based on bivariate polynomial.
Comput. Networks, 2022

2021
Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game.
SN Comput. Sci., 2021

TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications.
J. Ambient Intell. Humaniz. Comput., 2021

CCA secure and efficient proxy re-encryption scheme without bilinear pairing.
J. Inf. Secur. Appl., 2021

KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage.
J. Inf. Secur. Appl., 2021

Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets.
J. Inf. Secur. Appl., 2021

Blockchain-based decentralised access control scheme for dynamic hierarchies.
Int. J. Inf. Comput. Secur., 2021

Pixel co-ordinate-based secret image sharing scheme with constant size shadow images.
Comput. Electr. Eng., 2021

2020
Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks.
J. Inf. Secur. Appl., 2020

Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance.
J. Inf. Secur. Appl., 2020

DR-PRE: dual receiver proxy re-encryption scheme.
Inf. Secur. J. A Glob. Perspect., 2020

2019
Flexible cryptographic access control through proxy re-encryption between groups.
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019

RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication.
Proceedings of the Distributed Computing and Internet Technology, 2019

2018
Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
Access control mechanisms for outsourced data in public cloud using polynomial interpolation and multilinear map.
Int. J. Cloud Comput., 2017

A Ringer-Based Throttling Approach to Mitigate DDoS Attacks.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Proxy visible re-encryption scheme with application to e-mail forwarding.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Security analysis of group key management schemes of wireless sensor network under active outsider adversary model.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
Group-oriented encryption for dynamic groups with constant rekeying cost.
Secur. Commun. Networks, 2016

Outsource-Secured Calculation of Closest Pair of Points.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

2015
Provably secure public key cryptosystem with limited number of encryptions for authorised sharing of outsourced data.
Int. J. Cloud Comput., 2015

On the Security of an Efficient Group Key Agreement Scheme for MANETs.
IACR Cryptol. ePrint Arch., 2015

Non-tree Based Group Key Management Scheme With Constant Rekeying and Storage Cost.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing.
Proceedings of the Security in Computing and Communications, 2015

Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme.
Proceedings of the Security in Computing and Communications, 2015

Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2013
Secure group and multi-layer group communication schemes based on polynomial interpolation.
Secur. Commun. Networks, 2013

Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation.
Int. J. Trust. Manag. Comput. Commun., 2013

Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud.
Int. J. Inf. Commun. Technol., 2013

On the Security of Group-based Proxy Re-encryption Scheme.
IACR Cryptol. ePrint Arch., 2013

Efficient Hierarchical Key Management Scheme Based on Polynomial Construction.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Provable data possession scheme with constant proof size for outsourced data in public cloud.
Proceedings of the International Conference on Advances in Computing, 2013

Secure group key management scheme based on dual receiver cryptosystem.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

2012
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Access control mechanisms for outsourced data in cloud.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

2011
Group key management scheme for simultaneous multiple groups with overlapped membership.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

2009
Design and Implementation of Secure Internet Based Voting System with User Anonymity Using Identity Based Encryption System.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009


  Loading...