Select Publications
Books
2021, Preface
,2019, Preface
,Book Chapters
2024, 'Bitcoin Blockchain System: An Overview of Security and Privacy Aspects', in Advances in Information Security, pp. 75 - 108, http://dx.doi.org/10.1007/978-3-031-32146-7_3
,2024, 'DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs', in , pp. 124 - 143, http://dx.doi.org/10.1007/978-981-97-5028-3_7
,2024, 'Layer 2 Scaling Solutions for Blockchains', in Advances in Information Security, pp. 261 - 300, http://dx.doi.org/10.1007/978-3-031-32146-7_9
,2024, 'One-Phase Batch Update on Sparse Merkle Trees for Rollups', in Communications in Computer and Information Science, Springer Nature Singapore, pp. 1 - 21, http://dx.doi.org/10.1007/978-981-97-0006-6_1
,2023, 'Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs', in , pp. 484 - 517, http://dx.doi.org/10.1007/978-3-031-38554-4_16
,2023, 'LightSwap: An Atomic Swap Does Not Require Timeouts at both Blockchains', in , pp. 219 - 235, http://dx.doi.org/10.1007/978-3-031-25734-6_14
,2023, 'Cascading Failures in Smart Grids under Random, Targeted, and Adaptive Attacks', in World Scientific Series in Digital Forensics and Cybersecurity, WORLD SCIENTIFIC, pp. 173 - 211, http://dx.doi.org/10.1142/9789811273551_0006
,2022, 'Lightweight key management in multi-hop wireless sensor networks', in Distributed Sensor Networks: Sensor Networking and Applications, pp. 829 - 847
,2022, 'Forward Traceability for Product Authenticity Using Ethereum Smart Contracts', in , pp. 514 - 523, http://dx.doi.org/10.1007/978-3-031-23020-2_29
,2022, 'On the Vulnerability of Community Structure in Complex Networks', in Principles of Social Networking: The New Horizon and Emerging Challenges, pp. 109 - 136, http://dx.doi.org/10.1007/978-981-16-3398-0_6
,2020, 'Fault Tolerance and Reliability of Smart Grids', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 468 - 478, http://dx.doi.org/10.1007/978-3-319-78262-1_242
,2019, 'Fault Tolerance and Reliability of Smart Grids', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1 - 11, http://dx.doi.org/10.1007/978-3-319-32903-1_242-1
,2017, 'Securing Cloud Data', in Cloud Computing with e-Science Applications, CRC Press, pp. 41 - 72, http://dx.doi.org/10.1201/b18021-3
,2017, 'Securing cloud data', in Cloud Computing with e-Science Applications, pp. 41 - 71, http://dx.doi.org/10.1201/b18021
,2016, '- Lightweight Key Management in Multi-Hop Wireless Sensor Networks', in Distributed Sensor Networks, Taylor & Francis, pp. 854 - 873, http://dx.doi.org/10.1201/b12988-43
,, 2016, '- Maritime Domain Awareness', in Distributed Sensor Networks, Chapman and Hall/CRC, pp. 874 - 899, http://dx.doi.org/10.1201/b12988-44
2016, 'Lightweight Key Management in Multi-Hop Wireless Sensor Networks', in Distributed Sensor Networks: Second Edition: Sensor Networking and Applications, pp. 829 - 847, http://dx.doi.org/10.1201/b12988-43
,2015, 'Cloud Data Auditing Using Proofs of Retrievability', in Computer Communications and Networks, Springer International Publishing, pp. 193 - 210, http://dx.doi.org/10.1007/978-3-319-25988-8_11
,2011, 'Key Predistribution in Wireless Sensor Networks When Sensors Are Within Communication Range', in Nikoletseas S; Rolim JDP (ed.), THEORETICAL ASPECTS OF DISTRIBUTED COMPUTING IN SENSOR NETWORKS, SPRINGER, pp. 787 - 832, http://dx.doi.org/10.1007/978-3-642-14849-1_24
,Journal articles
2024, 'Cumulus: Blockchain-Enabled Privacy Preserving Data Audit in Cloud', Distributed Ledger Technologies: Research and Practice, http://dx.doi.org/10.1145/3672570
,2024, 'Efficient keyword search on encrypted dynamic cloud data', Advances in Mathematics of Communications, 18, pp. 1442 - 1470, http://dx.doi.org/10.3934/amc.2022101
,2024, 'Electric Vehicle Next Charge Location Prediction', IEEE Transactions on Intelligent Transportation Systems, 25, pp. 14128 - 14139, http://dx.doi.org/10.1109/TITS.2024.3401703
,2024, 'SoK: Trusting Self-Sovereign Identity', Proceedings on Privacy Enhancing Technologies, 2024, pp. 297 - 313, http://dx.doi.org/10.56553/popets-2024-0079
,2023, 'Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain', Sensors (Basel, Switzerland), 23, http://dx.doi.org/10.3390/s23208352
,2023, 'Accelerated Verifiable Fair Digital Exchange', Distributed Ledger Technologies: Research and Practice, 2, pp. 1 - 24, http://dx.doi.org/10.1145/3596448
,2023, 'FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT', IEEE Transactions on Network and Service Management, 20, pp. 2929 - 2941, http://dx.doi.org/10.1109/TNSM.2023.3239832
,2023, 'Strategic Analysis of Griefing Attack in Lightning Network', IEEE Transactions on Network and Service Management, 20, pp. 1790 - 1803, http://dx.doi.org/10.1109/TNSM.2022.3230768
,2023, 'CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1060 - 1073, http://dx.doi.org/10.1109/TDSC.2022.3148476
,2022, 'A Digital Asset Inheritance Model to Convey Online Persona Posthumously', International Journal of Information Security, 21, pp. 983 - 1003, http://dx.doi.org/10.1007/s10207-022-00593-8
,2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, 202, http://dx.doi.org/10.1016/j.jnca.2022.103356
,2022, 'Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques', IEEE Transactions on Cloud Computing, 10, pp. 2090 - 2101, http://dx.doi.org/10.1109/TCC.2020.3000342
,2021, 'Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie', Automatic Control and Computer Sciences, 55, pp. 319 - 333, http://dx.doi.org/10.3103/S0146411621040039
,2021, 'A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0', IEEE Transactions on Industrial Informatics, 17, pp. 2316 - 2324, http://dx.doi.org/10.1109/TII.2020.2998105
,2021, 'Design of Anonymous Endorsement System in Hyperledger Fabric', IEEE Transactions on Emerging Topics in Computing, 9, pp. 1780 - 1791, http://dx.doi.org/10.1109/TETC.2019.2920719
,2020, 'A parallelized disjunctive query based searchable encryption scheme for big data', Future Generation Computer Systems, 109, pp. 583 - 592, http://dx.doi.org/10.1016/j.future.2018.05.048
,2020, 'A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT', Journal of Network and Computer Applications, 149, http://dx.doi.org/10.1016/j.jnca.2019.102481
,2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226
,2020, 'Efficient Decentralized Attribute Based Access Control for Mobile Clouds', IEEE Transactions on Cloud Computing, 8, pp. 124 - 137, http://dx.doi.org/10.1109/TCC.2017.2754255
,2020, 'Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage', IEEE Transactions on Cloud Computing, 8, pp. 138 - 151, http://dx.doi.org/10.1109/TCC.2017.2767584
,2019, 'The secure link prediction problem', Advances in Mathematics of Communications, 13, pp. 733 - 757, http://dx.doi.org/10.3934/amc.2019043
,2019, 'A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data', IEEE Transactions on Emerging Topics in Computing, 7, pp. 530 - 544, http://dx.doi.org/10.1109/TETC.2017.2737789
,2019, 'Maximal contrast color visual secret sharing schemes', Designs, Codes, and Cryptography, 87, pp. 1699 - 1711, http://dx.doi.org/10.1007/s10623-018-0570-6
,2019, 'Understanding Vulnerability of Communities in Complex Networks', , http://dx.doi.org/10.48550/arxiv.1906.05238
,2019, 'Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment', Computer Communications, 133, pp. 102 - 114, http://dx.doi.org/10.1016/j.comcom.2018.08.004
,2018, 'On the economic significance of ransomware campaigns: A Bitcoin transactions perspective', Computers and Security, 79, pp. 162 - 189, http://dx.doi.org/10.1016/j.cose.2018.08.008
,2018, 'A survey on security and privacy issues of bitcoin', IEEE Communications Surveys and Tutorials, 20, pp. 3416 - 3452, http://dx.doi.org/10.1109/COMST.2018.2842460
,2018, 'Key predistribution using transversal design on a grid of wireless sensor network', Ad-Hoc and Sensor Wireless Networks, 5, pp. 247 - 264
,2018, 'Security issues in named data networks', Computer, 51, pp. 66 - 75, http://dx.doi.org/10.1109/MC.2018.1151010
,