WBAN: Driving e-healthcare beyond telemedicine to remote health monitoring: Architecture and protocols PKD Pramanik, A Nayyar, G Pareek Telemedicine technologies, 89-119, 2019 | 110 | 2019 |
Security and privacy in remote healthcare: Issues, solutions, and standards PKD Pramanik, G Pareek, A Nayyar Telemedicine technologies, 201-225, 2019 | 83 | 2019 |
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage G Pareek, BR Purushothama Journal of information security and applications 63, 103009, 2021 | 20 | 2021 |
Crowd computing: The computing revolution PKD Pramanik, S Pal, G Pareek, S Dutta, P Choudhury Crowdsourcing and knowledge management in contemporary business environments …, 2019 | 18 | 2019 |
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance G Pareek, BR Purushothama Journal of Information Security and Applications 54, 102543, 2020 | 17 | 2020 |
Telemedicine technologies PKD Pramanik, A Nayyar, G Pareek Academic Press, 2019 | 16 | 2019 |
Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time G Pareek, BR Purushothama Sādhanā 43 (9), 137, 2018 | 10 | 2018 |
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes. G Pareek, BR Purushothama SECRYPT, 519-524, 2017 | 9 | 2017 |
Proxy visible re-encryption scheme with application to e-mail forwarding G Pareek Proceedings of the 10th international conference on security of information …, 2017 | 7 | 2017 |
Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model A Chaudhari, G Pareek, BR Purushothama 2017 International Conference on Advances in Computing, Communications and …, 2017 | 6 | 2017 |
Proxy re-encryption scheme for access control enforcement delegation on outsourced data in public cloud G Pareek, BR Purushothama International Conference on Information Systems Security, 251-271, 2018 | 5 | 2018 |
Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies G Pareek, BR Purushothama Sādhanā 44 (12), 235, 2019 | 4 | 2019 |
Efficient strong key indistinguishable access control in dynamic hierarchies with constant decryption cost G Pareek, BR Purushothama Proceedings of the 11th International Conference on Security of Information …, 2018 | 4 | 2018 |
Wormhole attack behaviour in monte-carlo localization for mobile sensor networks VR Kumari, A Nagaraju, G Pareek Journal of Sensor Technology 2014, 2014 | 4 | 2014 |
Efficient dynamic key‐aggregate cryptosystem for secure and flexible data sharing G Pareek, S Maiti Concurrency and Computation: Practice and Experience 35 (19), e7553, 2023 | 3 | 2023 |
TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications G Pareek, BR Purushothama Journal of Ambient Intelligence and Humanized Computing 12 (2), 1943-1965, 2021 | 3 | 2021 |
Outsource-secured calculation of closest pair of points C Kuruba, K Gilbert, P Sidhaye, G Pareek, PB Rangappa Security in Computing and Communications: 4th International Symposium, SSCC …, 2016 | 3 | 2016 |
A result verification scheme for mapreduce having untrusted participants G Pareek, C Goyal, M Nayal Intelligent Distributed Computing, 11-19, 2015 | 3 | 2015 |
Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets G Pareek, BR Purushothama Journal of Information Security and Applications 58, 102799, 2021 | 2 | 2021 |
Blockchain-based decentralised access control scheme for dynamic hierarchies G Pareek, BR Purushothama International Journal of Information and Computer Security 16 (3-4), 324-354, 2021 | 2 | 2021 |