Vimal Kumar

Orcid: 0000-0002-4955-3058

Affiliations:
  • University of Waikato, Department of Computer Science, Hamilton, New Zealand


According to our database1, Vimal Kumar authored at least 23 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Assessing Vulnerability from Its Description.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

Listen to the Music: Evaluating the Use of Music in Audio Based Authentication.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

2021
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Searching on Non-Systematic Erasure Codes.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

On Random Editing in LZ-End.
Proceedings of the 31st Data Compression Conference, 2021

Towards Embedding Data Provenance in Files.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Local Editing in LZ-End Compressed Data.
CoRR, 2020

ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection.
Proceedings of the Network and System Security - 14th International Conference, 2020

2019
Using Audio Characteristics for Mobile Device Authentication.
Proceedings of the Network and System Security - 13th International Conference, 2019

A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNs.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Behaviour Based Ransomware Detection.
Proceedings of 34th International Conference on Computers and Their Applications, 2019

2018
Secure Sensor Cloud
Synthesis Lectures on Algorithms and Software in Engineering, Morgan & Claypool Publishers, ISBN: 978-3-031-01527-4, 2018

2015
Multi-party encryption (MPE): secure communications in delay tolerant networks.
Wirel. Networks, 2015

Distributed Attribute Based Access Control of Aggregated Data in Sensor Clouds.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

2014
Sensor Cloud: A Cloud of Virtual Sensors.
IEEE Softw., 2014

Efficient and Secure Code Dissemination in Sensor Clouds.
Proceedings of the IEEE 15th International Conference on Mobile Data Management, 2014

2013
PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

2012
Three Point Encryption (3PE): Secure Communications in Delay Tolerant Networks.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

2011
Challenges in Secure Sensor-Cloud Computing.
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

2010
Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Wireless Sensor Network Technologies for the Information Explosion Era, 2010

Performance Analysis of Secure Hierarchical Data Aggregation in Wireless Sensor Networks.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

A test-bed for secure hierarchical data aggregation in wireless sensor networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010


  Loading...