Gaurav Pareek

Orcid: 0000-0001-7241-7778

According to our database1, Gaurav Pareek authored at least 18 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage.
Proceedings of the Distributed Computing and Intelligent Technology, 2024

2023
Efficient dynamic key-aggregate cryptosystem for secure and flexible data sharing.
Concurr. Comput. Pract. Exp., 2023

2021
TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications.
J. Ambient Intell. Humaniz. Comput., 2021

KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage.
J. Inf. Secur. Appl., 2021

Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets.
J. Inf. Secur. Appl., 2021

Blockchain-based decentralised access control scheme for dynamic hierarchies.
Int. J. Inf. Comput. Secur., 2021

2020
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance.
J. Inf. Secur. Appl., 2020

2019
Flexible cryptographic access control through proxy re-encryption between groups.
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019

2018
Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
A Ringer-Based Throttling Approach to Mitigate DDoS Attacks.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Proxy visible re-encryption scheme with application to e-mail forwarding.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
Outsource-Secured Calculation of Closest Pair of Points.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

2014
Mobile Sensor Localization Under Wormhole Attacks: An Analysis.
Proceedings of the Intelligent Distributed Computing, 2014

A Result Verification Scheme for MapReduce Having Untrusted Participants.
Proceedings of the Intelligent Distributed Computing, 2014


  Loading...