M. Choudary Gorantla

According to our database1, M. Choudary Gorantla authored at least 21 papers between 2005 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
An integrated framework for enhancing privacy in online social networks.
Proceedings of the 6th ACM India Computing Convention, 2013

2011
Modeling key compromise impersonation attacks on group key exchange protocols.
ACM Trans. Inf. Syst. Secur., 2011

Stronger security model of group key agreement.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
One Round Group Key Exchange with Forward Security in the Standard Model.
IACR Cryptol. ePrint Arch., 2010

Attribute-Based Authenticated Key Exchange.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.
Proceedings of the Public Key Cryptography, 2009

Generic One Round Group Key Exchange in the Standard Model.
Proceedings of the Information, Security and Cryptology, 2009

Universally composable contributory group key exchange.
Proceedings of the 2009 ACM Symposium on Information, 2009

Strong Designated Verifier Signature in a Multi-user Setting.
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
ID-based One-pass Authenticated Key Establishment.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
Threshold key issuing in identity-based cryptosystems.
Comput. Stand. Interfaces, 2007

On the Connection Between Signcryption and One-Pass Key Establishment.
Proceedings of the Cryptography and Coding, 2007

2006
Identity Based Multisignatures.
Informatica, 2006

Verifiably Encrypted Signature Scheme with Threshold Adjudication.
IACR Cryptol. ePrint Arch., 2006

2005
A Survey on ID-Based Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2005

Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems
CoRR, 2005

An Effective Certificateless Signature Scheme Based on Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005

ID-based Serial Multisignature Scheme using Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005

An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Verifiably Encrypted Signature Scheme Without Random Oracles.
Proceedings of the Distributed Computing and Internet Technology, 2005

An Efficient Certificateless Signature Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...