S. Sharmila Deva Selvi
According to our database1,
S. Sharmila Deva Selvi
authored at least 63 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Security Analysis and Performance Evaluation of Certificateless Proxy Re-Encryption for Blockchain Applications.
IEEE Access, 2025
2023
IACR Cryptol. ePrint Arch., 2023
2021
J. Internet Serv. Inf. Secur., 2021
2020
J. Internet Serv. Inf. Secur., 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
2019
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy, 2019
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019
2018
Proceedings of the Provable Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Provable Security, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without Pairing in the Random Oracle Model.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
Secur. Commun. Networks, 2016
J. Internet Serv. Inf. Secur., 2016
2015
Proceedings of the SECRYPT 2015, 2015
2013
J. Internet Serv. Inf. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round.
Proceedings of the Provable Security - 7th International Conference, 2013
2012
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Internet Serv. Inf. Secur., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012
2011
IACR Cryptol. ePrint Arch., 2011
CCA Secure Certificateless Encryption Schemes based on RSA.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Advances in Information and Computer Security, 2011
Proceedings of the Security Aspects in Information Technology, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
An Identity based Ring Signcryption Scheme with Public Verifiability.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Information Security, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
On the Security of Two Ring Signcryption Schemes.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Progress in Cryptology, 2009
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008