关注
Gaurav Pareek
Gaurav Pareek
Department of Computer Science and Engineering, Indian Institute of Information Technology Vadodara
在 diu.iiitvadodara.ac.in 的电子邮件经过验证
标题
引用次数
年份
A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage
G Pareek, BR Purushothama
International Conference on Distributed Computing and Intelligent Technology …, 2024
2024
A Provably Secure Re-encryption-Based Access Control in Hierarchy
G Pareek, BR Purushothama
Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th …, 2019
2019
A result verification scheme for mapreduce having untrusted participants
G Pareek, C Goyal, M Nayal
Intelligent Distributed Computing, 11-19, 2015
32015
A Ringer-Based Throttling Approach to Mitigate DDoS Attacks
SV Sawant, G Pareek, BR Purushothama
Security in Computing and Communications: 5th International Symposium, SSCC …, 2017
2017
Blockchain-based decentralised access control scheme for dynamic hierarchies
G Pareek, BR Purushothama
International Journal of Information and Computer Security 16 (3-4), 324-354, 2021
22021
Crowd computing: The computing revolution
PKD Pramanik, S Pal, G Pareek, S Dutta, P Choudhury
Crowdsourcing and knowledge management in contemporary business environments …, 2019
152019
Cryptographic Solutions for Secure Sharing of Outsourced Data
G Pareek
Ponda, 0
Efficient dynamic key‐aggregate cryptosystem for secure and flexible data sharing
G Pareek, S Maiti
Concurrency and Computation: Practice and Experience, e7553, 2022
22022
Efficient strong key indistinguishable access control in dynamic hierarchies with constant decryption cost
G Pareek, BR Purushothama
Proceedings of the 11th International Conference on Security of Information …, 2018
42018
Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies
G Pareek, BR Purushothama
Sādhanā 44 (12), 235, 2019
42019
Flexible cryptographic access control through proxy re-encryption between groups
G Pareek
Proceedings of the 20th International Conference on Distributed Computing …, 2019
22019
Group key management schemes under strong active adversary model: a security analysis
SV Sawant, G Pareek, BR Purushothama
Security in Computing and Communications: 6th International Symposium, SSCC …, 2019
12019
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage
G Pareek, BR Purushothama
Journal of information security and applications 63, 103009, 2021
182021
Mobile sensor localization under wormhole attacks: An analysis
G Pareek, R Kumari, A Nagaraju
Intelligent Distributed Computing, 129-137, 2015
22015
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes.
G Pareek, BR Purushothama
SECRYPT, 519-524, 2017
92017
Outsource-secured calculation of closest pair of points
C Kuruba, K Gilbert, P Sidhaye, G Pareek, PB Rangappa
Security in Computing and Communications: 4th International Symposium, SSCC …, 2016
32016
Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
G Pareek, BR Purushothama
Sādhanā 43 (9), 137, 2018
102018
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance
G Pareek, BR Purushothama
Journal of Information Security and Applications 54, 102543, 2020
142020
Proxy re-encryption scheme for access control enforcement delegation on outsourced data in public cloud
G Pareek, BR Purushothama
International Conference on Information Systems Security, 251-271, 2018
52018
Proxy visible re-encryption scheme with application to e-mail forwarding
G Pareek
Proceedings of the 10th international conference on security of information …, 2017
72017
系统目前无法执行此操作,请稍后再试。
文章 1–20