Nisha Panwar

Orcid: 0000-0002-7179-5213

According to our database1, Nisha Panwar authored at least 32 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Information-Theoretically Secure and Highly Efficient Search and Row Retrieval.
Proc. VLDB Endow., 2023

Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data.
IACR Cryptol. ePrint Arch., 2023

2022
Quest: Privacy-Preserving Monitoring of Network Data: A System for Organizational Response to Pandemics.
IEEE Trans. Serv. Comput., 2022

Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data.
IEEE Trans. Knowl. Data Eng., 2022

IoT Notary: Attestable Sensor Data Capture in IoT Environments.
ACM Trans. Internet Things, 2022

QUEST: Privacy-Preserving Monitoring of Network Data.
Proceedings of the IEEE World Congress on Services, 2022

2021
CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes.
ACM Trans. Cyber Phys. Syst., 2021

Integrity Verification for Streaming IoT Applications with a Minimalist Logging Scheme.
Proceedings of the IEEE International Conference on Smart Computing, 2021

PRISM: Private Verifiable Set Computation over Multi-Owner Outsourced Databases.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

2020
Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets.
CoRR, 2020

Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version.
CoRR, 2020

Security and Privacy Aspects in 5G Networks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

IoT Expunge: Implementing Verifiable Retention of IoT Data.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries.
Proc. VLDB Endow., 2019

Smart Home Survey on Security and Privacy.
CoRR, 2019

IoT Notary: Sensor Data Attestation in Smart Environment.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Verifiable Round-Robin Scheme for Smart Homes.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Peripheral Authentication for Parked Vehicles over Wireless Radio Communication.
CoRR, 2018

Privacy-oriented dependency via deniable SIGMA protocol.
Comput. Secur., 2018

Trustworthy Sensing in an Untrusted IoT Environment.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Trustworthy Privacy Policy Translation in Untrusted IoT Environments.
Proceedings of the 3rd International Conference on Internet of Things, 2018

2017
Dynamic attribute based vehicle authentication.
Wirel. Networks, 2017

The excessive power of <i>Ctrl</i>+<i>C</i> and <i>Ctrl</i>+<i>V</i> in CS research and career development.
XRDS, 2017

2016
Vehicle authentication via monolithically certified public key and attributes.
Wirel. Networks, 2016

A survey on 5G: The next generation of mobile communication.
Phys. Commun., 2016

Optical PUF for Non-Forwardable Vehicle Authentication.
Comput. Commun., 2016

Peripheral authentication for autonomous vehicles.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

2015
Vehicle to Vehicle Authentication.
CoRR, 2015

2013
Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond.
Proceedings of the SAFECOMP 2013, 2013


  Loading...