Roopa Vishwanathan

Orcid: 0009-0008-6954-052X

According to our database1, Roopa Vishwanathan authored at least 32 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Comprehensive Survey of Unmanned Aerial Systems' Risks and Mitigation Strategies.
CoRR, June, 2025

SCOOP: CoSt-effective COngestiOn Attacks in Payment Channel Networks.
CoRR, March, 2025

Verifiable Computation in Smart Grids Using Dynamic Slicing.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2025

FIRST: FrontrunnIng Resistant Smart ConTracts.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
SoK: Payment Channel Networks.
CoRR, 2024

PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edge.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

SPRITE: Secure and Private Routing in Payment Channel Networks.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

RACED: Routing in Payment Channel Networks Using Distributed Hash Tables.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Auroch: Auction-Based Multipath Routing for Payment Channel Networks.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2022
FIRST: FrontrunnIng Resilient Smart ConTracts.
CoRR, 2022

Private and Secure Smart Meter Billing.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

2021
ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Off-chain Execution and Verification of Computationally Intensive Smart Contracts.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

APECS: A Distributed Access Control Framework for Pervasive Edge Computing Services.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

SoK: Money Laundering in Cryptocurrencies.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Balance Transfers and Bailouts in Credit Networks using Blockchains.
CoRR, 2020

Balance Transfers and Bailouts in Credit Networks using Blockchains<sup>*</sup>.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

2019
Rebalancing in Acyclic Payment Networks.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Exploring Automation in Proofs of Attribute-based Encryption in the Standard Model.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Private and Secure Mixing in Credit Networks.
Proceedings of the 2019 International Electronics Communication Conference, 2019

BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
New Techniques for Public Key Encryption with Sender Recovery.
IACR Cryptol. ePrint Arch., 2018

Automated Proofs of Signatures using Bilinear Pairings.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Attribute Based Signatures: The Case for Automation.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2015
Expiration and Revocation of Keys for Attribute-Based Signatures.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2013
Encrypted Secret Sharing and Analysis by Plaintext Randomization.
Proceedings of the Information Security, 16th International Conference, 2013

Multi-user dynamic proofs of data possession using trusted hardware.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2011
General Secure Function Evaluation using standard trusted computing hardware.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

2010
Privacy Preserving Group Nearest Neighbour Queries in Location-Based Services Using Cryptographic Techniques.
Proceedings of the Global Communications Conference, 2010

2009
A two-level protocol to answer private location-based queries.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology.
Proceedings of the Data and Applications Security XXIII, 2009


  Loading...