关注
Dr. Gaurav Pareek
Dr. Gaurav Pareek
Indian Institute of Information Technology Vadodara, International Campus Diu
在 diu.iiitvadodara.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
WBAN: Driving e-healthcare beyond telemedicine to remote health monitoring: Architecture and protocols
PKD Pramanik, A Nayyar, G Pareek
Telemedicine technologies, 89-119, 2019
1102019
Security and privacy in remote healthcare: Issues, solutions, and standards
PKD Pramanik, G Pareek, A Nayyar
Telemedicine technologies, 201-225, 2019
832019
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage
G Pareek, BR Purushothama
Journal of information security and applications 63, 103009, 2021
202021
Crowd computing: The computing revolution
PKD Pramanik, S Pal, G Pareek, S Dutta, P Choudhury
Crowdsourcing and knowledge management in contemporary business environments …, 2019
182019
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance
G Pareek, BR Purushothama
Journal of Information Security and Applications 54, 102543, 2020
172020
Telemedicine technologies
PKD Pramanik, A Nayyar, G Pareek
Academic Press, 2019
162019
Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
G Pareek, BR Purushothama
Sādhanā 43 (9), 137, 2018
102018
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes.
G Pareek, BR Purushothama
SECRYPT, 519-524, 2017
92017
Proxy visible re-encryption scheme with application to e-mail forwarding
G Pareek
Proceedings of the 10th international conference on security of information …, 2017
72017
Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model
A Chaudhari, G Pareek, BR Purushothama
2017 International Conference on Advances in Computing, Communications and …, 2017
62017
Proxy re-encryption scheme for access control enforcement delegation on outsourced data in public cloud
G Pareek, BR Purushothama
International Conference on Information Systems Security, 251-271, 2018
52018
Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies
G Pareek, BR Purushothama
Sādhanā 44 (12), 235, 2019
42019
Efficient strong key indistinguishable access control in dynamic hierarchies with constant decryption cost
G Pareek, BR Purushothama
Proceedings of the 11th International Conference on Security of Information …, 2018
42018
Wormhole attack behaviour in monte-carlo localization for mobile sensor networks
VR Kumari, A Nagaraju, G Pareek
Journal of Sensor Technology 2014, 2014
42014
Efficient dynamic key‐aggregate cryptosystem for secure and flexible data sharing
G Pareek, S Maiti
Concurrency and Computation: Practice and Experience 35 (19), e7553, 2023
32023
TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications
G Pareek, BR Purushothama
Journal of Ambient Intelligence and Humanized Computing 12 (2), 1943-1965, 2021
32021
Outsource-secured calculation of closest pair of points
C Kuruba, K Gilbert, P Sidhaye, G Pareek, PB Rangappa
Security in Computing and Communications: 4th International Symposium, SSCC …, 2016
32016
A result verification scheme for mapreduce having untrusted participants
G Pareek, C Goyal, M Nayal
Intelligent Distributed Computing, 11-19, 2015
32015
Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets
G Pareek, BR Purushothama
Journal of Information Security and Applications 58, 102799, 2021
22021
Blockchain-based decentralised access control scheme for dynamic hierarchies
G Pareek, BR Purushothama
International Journal of Information and Computer Security 16 (3-4), 324-354, 2021
22021
系统目前无法执行此操作,请稍后再试。
文章 1–20