Y. Sreenivasa Rao

Orcid: 0000-0001-8701-0209

According to our database1, Y. Sreenivasa Rao authored at least 28 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Designing Secure Data Storage and Retrieval Scheme in Cloud-Assisted Internet-of-Drones Environment.
IEEE Internet Things J., April, 2024

2023
Verifiable and Boolean keyword searchable attribute-based signcryption for electronic medical record storage and retrieval in cloud computing environment.
J. Supercomput., December, 2023

Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment.
J. Inf. Secur. Appl., June, 2023

2022
Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems.
J. Supercomput., 2022

2021
Efficient single round attribute-based authenticated key exchange protocol.
Int. J. Comput. Math. Comput. Syst. Theory, 2021

2020
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party.
J. Inf. Secur. Appl., 2020

2017
Computational friendly attribute-based encryptions with short ciphertext.
Theor. Comput. Sci., 2017

Attribute-based online/offline signcryption scheme.
Int. J. Commun. Syst., 2017

Signature-policy attribute-based key-insulated signature.
IET Inf. Secur., 2017

A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing.
Future Gener. Comput. Syst., 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017

An Efficient Attribute-Based Authenticated Key Exchange Protocol.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Bandwidth-efficient attribute-based key-insulated signatures with message recovery.
Inf. Sci., 2016

Efficient attribute-based signature and signcryption realizing expressive access structures.
Int. J. Inf. Sec., 2016

Attribute-based key-insulated signature for boolean formula.
Int. J. Comput. Math., 2016

2015
Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015

Fully secure anonymous spatial encryption under affine space delegation functionality revisited.
J. Inf. Secur. Appl., 2015

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption.
Proceedings of the Information Systems Security - 11th International Conference, 2015

2014
Attribute Based Key-Insulated Signatures with Message Recovery.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy.
Proceedings of the Distributed Computing and Internet Technology, 2014

Expressive Attribute Based Signcryption with Constant-Size Ciphertext.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext.
Proceedings of the Provable Security - 7th International Conference, 2013

Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network.
Proceedings of the Network and System Security - 7th International Conference, 2013

Recipient Anonymous Ciphertext-Policy Attribute Based Encryption.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption.
Proceedings of the Communications and Multimedia Security, 2013

2012
Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012


  Loading...