A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage G Pareek, BR Purushothama International Conference on Distributed Computing and Intelligent Technology …, 2024 | | 2024 |
Efficient dynamic key‐aggregate cryptosystem for secure and flexible data sharing G Pareek, S Maiti Concurrency and Computation: Practice and Experience, e7553, 2022 | 2 | 2022 |
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage G Pareek, BR Purushothama Journal of information security and applications 63, 103009, 2021 | 18 | 2021 |
Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets G Pareek, BR Purushothama Journal of Information Security and Applications 58, 102799, 2021 | 2 | 2021 |
Blockchain-based decentralised access control scheme for dynamic hierarchies G Pareek, BR Purushothama International Journal of Information and Computer Security 16 (3-4), 324-354, 2021 | 2 | 2021 |
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance G Pareek, BR Purushothama Journal of Information Security and Applications 54, 102543, 2020 | 14 | 2020 |
TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications G Pareek, BR Purushothama Journal of Ambient Intelligence and Humanized Computing 12, 1943-1965, 2020 | 3 | 2020 |
Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies G Pareek, BR Purushothama Sādhanā 44 (12), 235, 2019 | 4 | 2019 |
Flexible cryptographic access control through proxy re-encryption between groups G Pareek Proceedings of the 20th International Conference on Distributed Computing …, 2019 | 2 | 2019 |
Telemedicine technologies PKD Pramanik, A Nayyar, G Pareek Academic Press, 2019 | 16 | 2019 |
Security and privacy in remote healthcare: Issues, solutions, and standards PKD Pramanik, G Pareek, A Nayyar Telemedicine technologies, 201-225, 2019 | 75 | 2019 |
WBAN: Driving e-healthcare beyond telemedicine to remote health monitoring: Architecture and protocols PKD Pramanik, A Nayyar, G Pareek Telemedicine technologies, 89-119, 2019 | 103 | 2019 |
Group key management schemes under strong active adversary model: a security analysis SV Sawant, G Pareek, BR Purushothama Security in Computing and Communications: 6th International Symposium, SSCC …, 2019 | 1 | 2019 |
A Provably Secure Re-encryption-Based Access Control in Hierarchy G Pareek, BR Purushothama Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th …, 2019 | | 2019 |
Crowd computing: The computing revolution PKD Pramanik, S Pal, G Pareek, S Dutta, P Choudhury Crowdsourcing and knowledge management in contemporary business environments …, 2019 | 15 | 2019 |
Proxy re-encryption scheme for access control enforcement delegation on outsourced data in public cloud G Pareek, BR Purushothama International Conference on Information Systems Security, 251-271, 2018 | 5 | 2018 |
Efficient strong key indistinguishable access control in dynamic hierarchies with constant decryption cost G Pareek, BR Purushothama Proceedings of the 11th International Conference on Security of Information …, 2018 | 4 | 2018 |
Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time G Pareek, BR Purushothama Sādhanā 43 (9), 137, 2018 | 10 | 2018 |
Proxy visible re-encryption scheme with application to e-mail forwarding G Pareek Proceedings of the 10th international conference on security of information …, 2017 | 7 | 2017 |
Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model A Chaudhari, G Pareek, BR Purushothama 2017 International Conference on Advances in Computing, Communications and …, 2017 | 6 | 2017 |