Select Publications
Journal articles
2017, 'Bitcoin Block Withholding Attack: Analysis and Mitigation', IEEE Transactions on Information Forensics and Security, 12, pp. 1967 - 1978, http://dx.doi.org/10.1109/TIFS.2016.2623588
,2017, 'A Graph Analytics Framework for Ranking Authors, Papers and Venues', , http://arxiv.org/abs/1708.00329v1
,2014, 'Decentralized access control with anonymous authentication of data stored in clouds', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 384 - 394, http://dx.doi.org/10.1109/TPDS.2013.38
,2014, 'A social network approach to trust management in VANETs', Peer-to-Peer Networking and Applications, 7, pp. 229 - 242, http://dx.doi.org/10.1007/s12083-012-0136-8
,2014, 'Applying transmission-coverage algorithms for secure geocasting in VANETs', International Journal of Computational Science and Engineering, 1, pp. 1 - 1, http://dx.doi.org/10.1504/ijcse.2014.10006161
,2013, 'Pairwise and triple key distribution in wireless sensor networks with applications', IEEE Transactions on Computers, 62, pp. 2224 - 2237, http://dx.doi.org/10.1109/TC.2012.138
,2013, 'A decentralized security framework for data aggregation and access control in smart grids', IEEE Transactions on Smart Grid, 4, pp. 196 - 205, http://dx.doi.org/10.1109/TSG.2012.2224389
,2012, 'Combinatorial batch codes: A lower bound and optimal constructions', Advances in Mathematics of Communications, 6, pp. 165 - 174, http://dx.doi.org/10.3934/amc.2012.6.165
,2012, 'Improved distinguishers for HC-128', Designs, Codes, and Cryptography, 63, pp. 225 - 240, http://dx.doi.org/10.1007/s10623-011-9550-9
,2011, 'Key pre-distribution using partially balanced designs in wireless sensor networks', International Journal of High Performance Computing and Networking, 7, pp. 19 - 28, http://dx.doi.org/10.1504/IJHPCN.2011.038707
,2009, 'Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks', ACM Transactions on Sensor Networks, 6, http://dx.doi.org/10.1145/1653760.1653764
,2009, 'Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme', International Journal of Distributed Sensor Networks, 5, pp. 660 - 674, http://dx.doi.org/10.1080/15501320802581466
,Conference Papers
2024, 'Blockchain-Enabled Private and Secure Task Allocation Framework', in 2024 16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024, pp. 666 - 670, http://dx.doi.org/10.1109/COMSNETS59351.2024.10427531
,2024, 'Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 3 - 38, http://dx.doi.org/10.1007/978-3-031-68376-3_1
,2024, 'Zero-Knowledge Proofs for Blockchains', in Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024, pp. 67 - 68, http://dx.doi.org/10.1109/DSN-S60304.2024.00028
,2023, 'ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness', in Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, ACM, pp. 1 - 10, presented at ASIA CCS '23: ACM Asia Conference on Computer and Communications Security, http://dx.doi.org/10.1145/3594556.3594608
,2023, 'Encoding of security properties for transparent consent data processing', in 2023 IEEE Guwahati Subsection Conference, GCON 2023, http://dx.doi.org/10.1109/GCON58516.2023.10183463
,2022, 'Blockchain-Enabled Secure and Smart Healthcare System', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), St. Petersburg, Florida, The United States of America, pp. 97 - 109, presented at 17th International Conference on Design Science Research in Information Systems and Technology, DESTRIST 2022, St. Petersburg, Florida, The United States of America, 01 June 2022 - 03 June 2022, http://dx.doi.org/10.1007/978-3-031-06516-3_8
,2022, 'SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT', in Proceedings - 22nd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2022, pp. 249 - 258, http://dx.doi.org/10.1109/CCGrid54584.2022.00034
,2021, 'Towards privacy-preserving digital contact tracing', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021, http://dx.doi.org/10.1109/ICBC51069.2021.9461052
,2021, 'Blockchain Enabled Data Trading with User Consent', in 2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021, pp. 263 - 271, http://dx.doi.org/10.1109/COMSNETS51098.2021.9352817
,2021, 'Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data', in 2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021, pp. 465 - 473, http://dx.doi.org/10.1109/COMSNETS51098.2021.9352809
,2021, 'Energy Blockchain for Demand Response and Distributed Energy Resource Management', in 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2021, pp. 425 - 431, http://dx.doi.org/10.1109/SmartGridComm51999.2021.9632326
,2020, 'Time is money: Countering griefing attack in lightning network', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 1036 - 1043, http://dx.doi.org/10.1109/TrustCom50675.2020.00138
,2020, 'Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain', in Proceedings - 2020 IEEE International Conference on Blockchain, Blockchain 2020, pp. 365 - 370, http://dx.doi.org/10.1109/Blockchain50366.2020.00053
,2020, 'HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, http://dx.doi.org/10.1109/ICBC48266.2020.9169405
,2020, 'Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 198 - 217, http://dx.doi.org/10.1007/978-3-030-65610-2_13
,2020, 'Public Key Infrastructure for Named Data Networks', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3369740.3369790
,2019, 'LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie', in International Symposium on Advanced Networks and Telecommunication Systems, ANTS, http://dx.doi.org/10.1109/ANTS47819.2019.9117924
,2019, 'Message from the chairs', in DATA 2019 - Proceedings of the 2nd ACM Workshop on Data Acquisition To Analysis, Part of SenSys 2019
,2019, 'BCC'19 chairs' welcome', in BCC 2019 - Proceedings of the 3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts, co-located with AsiaCCS 2019, pp. III
,2019, 'BlockV: A blockchain enabled peer-peer ride sharing service', in Proceedings - 2019 2nd IEEE International Conference on Blockchain, Blockchain 2019, pp. 463 - 468, http://dx.doi.org/10.1109/Blockchain.2019.00070
,2019, 'Rational Mining of Bitcoin', in 2019 11th International Conference on Communication Systems and Networks, COMSNETS 2019, pp. 1 - 8, http://dx.doi.org/10.1109/COMSNETS.2019.8711445
,2019, 'End to end secure anonymous communication for secure directed diffusion in IoT', in ACM International Conference Proceeding Series, pp. 445 - 450, http://dx.doi.org/10.1145/3288599.3295577
,2019, 'FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 355 - 371, http://dx.doi.org/10.1007/978-3-030-31919-9_23
,2018, 'An efficient and secure directed diffusion in industrial wireless sensor networks', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 41 - 46, http://dx.doi.org/10.1145/3243318.3243320
,2018, 'An Efficient Secure Distributed Cloud Storage for Append-Only Data', in IEEE International Conference on Cloud Computing, CLOUD, pp. 146 - 153, http://dx.doi.org/10.1109/CLOUD.2018.00026
,2018, 'BlockStore: A secure decentralized storage framework on blockchain', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 1096 - 1103, http://dx.doi.org/10.1109/AINA.2018.00157
,2018, 'Data forwarding and update propagation in grid network for NDN: A low-overhead approach', in International Symposium on Advanced Networks and Telecommunication Systems, ANTS, http://dx.doi.org/10.1109/ANTS.2018.8710136
,2018, 'Secrecy performance analysis of relay selection in adaptive DF relaying network with active adversary', in 11th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2017, pp. 1 - 6, http://dx.doi.org/10.1109/ANTS.2017.8384089
,2018, 'BCC'18 chairs' welcome', in BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018, pp. iii
,2018, 'On blockchain-based authorization architecture for beyond-5G mobile services', in 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, pp. 136 - 141, http://dx.doi.org/10.23919/ICITST.2017.8356363
,2018, 'A Blockchain Framework for Insurance Processes', in 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings, pp. 1 - 4, http://dx.doi.org/10.1109/NTMS.2018.8328731
,2018, 'Applying transmission-coverage algorithms for secure geocasting in VANETs', in International Journal of Computational Science and Engineering, pp. 17 - 26, http://dx.doi.org/10.1504/IJCSE.2018.089574
,2018, 'Keyword-based delegable proofs of storage', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 282 - 298, http://dx.doi.org/10.1007/978-3-319-99807-7_17
,2018, 'Secure computation of inner product of vectors with distributed entries and its applications to SVM', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 533 - 543, http://dx.doi.org/10.1007/978-3-319-99807-7_34
,2017, 'An efficient disjunctive query enabled ranked searchable encryption scheme', in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, pp. 425 - 432, http://dx.doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.267
,2017, 'Fast real-time authentication scheme for smart grids', in IoTSec 2017 - Proceedings of the ACM Workshop on Internet of Things (IoT) Security: Issues and Innovations, http://dx.doi.org/10.1145/3084030.3084033
,2017, 'BCC'17 chairs' Welcome', in BCC 2017 - Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, co-located with ASIA CCS 2017, pp. iii
,2017, 'Certificate transparency with enhancements and short proofs', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 381 - 389, http://dx.doi.org/10.1007/978-3-319-59870-3_22
,