A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage G Pareek, BR Purushothama International Conference on Distributed Computing and Intelligent Technology …, 2024 | | 2024 |
A Provably Secure Re-encryption-Based Access Control in Hierarchy G Pareek, BR Purushothama Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th …, 2019 | | 2019 |
A result verification scheme for mapreduce having untrusted participants G Pareek, C Goyal, M Nayal Intelligent Distributed Computing, 11-19, 2015 | 3 | 2015 |
A Ringer-Based Throttling Approach to Mitigate DDoS Attacks SV Sawant, G Pareek, BR Purushothama Security in Computing and Communications: 5th International Symposium, SSCC …, 2017 | | 2017 |
Blockchain-based decentralised access control scheme for dynamic hierarchies G Pareek, BR Purushothama International Journal of Information and Computer Security 16 (3-4), 324-354, 2021 | 2 | 2021 |
Crowd computing: The computing revolution PKD Pramanik, S Pal, G Pareek, S Dutta, P Choudhury Crowdsourcing and knowledge management in contemporary business environments …, 2019 | 15 | 2019 |
Cryptographic Solutions for Secure Sharing of Outsourced Data G Pareek Ponda, 0 | | |
Efficient dynamic key‐aggregate cryptosystem for secure and flexible data sharing G Pareek, S Maiti Concurrency and Computation: Practice and Experience, e7553, 2022 | 2 | 2022 |
Efficient strong key indistinguishable access control in dynamic hierarchies with constant decryption cost G Pareek, BR Purushothama Proceedings of the 11th International Conference on Security of Information …, 2018 | 4 | 2018 |
Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies G Pareek, BR Purushothama Sādhanā 44 (12), 235, 2019 | 4 | 2019 |
Flexible cryptographic access control through proxy re-encryption between groups G Pareek Proceedings of the 20th International Conference on Distributed Computing …, 2019 | 2 | 2019 |
Group key management schemes under strong active adversary model: a security analysis SV Sawant, G Pareek, BR Purushothama Security in Computing and Communications: 6th International Symposium, SSCC …, 2019 | 1 | 2019 |
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage G Pareek, BR Purushothama Journal of information security and applications 63, 103009, 2021 | 18 | 2021 |
Mobile sensor localization under wormhole attacks: An analysis G Pareek, R Kumari, A Nagaraju Intelligent Distributed Computing, 129-137, 2015 | 2 | 2015 |
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes. G Pareek, BR Purushothama SECRYPT, 519-524, 2017 | 9 | 2017 |
Outsource-secured calculation of closest pair of points C Kuruba, K Gilbert, P Sidhaye, G Pareek, PB Rangappa Security in Computing and Communications: 4th International Symposium, SSCC …, 2016 | 3 | 2016 |
Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time G Pareek, BR Purushothama Sādhanā 43 (9), 137, 2018 | 10 | 2018 |
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance G Pareek, BR Purushothama Journal of Information Security and Applications 54, 102543, 2020 | 14 | 2020 |
Proxy re-encryption scheme for access control enforcement delegation on outsourced data in public cloud G Pareek, BR Purushothama International Conference on Information Systems Security, 251-271, 2018 | 5 | 2018 |
Proxy visible re-encryption scheme with application to e-mail forwarding G Pareek Proceedings of the 10th international conference on security of information …, 2017 | 7 | 2017 |