M. Choudary Gorantla

According to our database1, M. Choudary Gorantla authored at least 21 papers between 2005 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
An integrated framework for enhancing privacy in online social networks.
Proceedings of the 6th ACM India Computing Convention, 2013

2011
Modeling key compromise impersonation attacks on group key exchange protocols.
ACM Trans. Inf. Syst. Secur., 2011

2010
Stronger Security Model of Group Key Agreement.
IACR Cryptol. ePrint Arch., 2010

Attribute-based Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2010

One Round Group Key Exchange with Forward Security in the Standard Model.
IACR Cryptol. ePrint Arch., 2010

2009
Generic One Round Group Key Exchange in the Standard Model.
IACR Cryptol. ePrint Arch., 2009

On the Connection between Signcryption and One-pass Key Establishment.
IACR Cryptol. ePrint Arch., 2009

Universally Composable Contributory Group Key Exchange.
IACR Cryptol. ePrint Arch., 2009

Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 2009

Strong Designated Verifier Signature in a Multi-user Setting.
Proceedings of the Seventh Australasian Information Security Conference, 2009

2008
ID-based One-pass Authenticated Key Establishment.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
Threshold key issuing in identity-based cryptosystems.
Comput. Stand. Interfaces, 2007

2006
Identity Based Multisignatures.
Informatica, 2006

Verifiably Encrypted Signature Scheme with Threshold Adjudication.
IACR Cryptol. ePrint Arch., 2006

2005
A Survey on ID-Based Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2005

Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems
CoRR, 2005

An Effective Certificateless Signature Scheme Based on Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005

ID-based Serial Multisignature Scheme using Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005

An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Verifiably Encrypted Signature Scheme Without Random Oracles.
Proceedings of the Distributed Computing and Internet Technology, 2005

An Efficient Certificateless Signature Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...