Select Publications
Conference Papers
2016, 'Publicly verifiable secure cloud storage for dynamic data using secure network coding', in ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 107 - 118, http://dx.doi.org/10.1145/2897845.2897915
,2016, 'Failure tolerant rational secret sharing', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 925 - 932, http://dx.doi.org/10.1109/AINA.2016.65
,2016, 'Message from the STPA 2016 Workshop Organizers', in Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016, pp. lxviii, http://dx.doi.org/10.1109/WAINA.2016.215
,2016, 'Preferential attachment model with degree bound and its application to key predistribution in WSN', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, Institute of Electrical and Electronics Engineers (IEEE), pp. 677 - 683, presented at 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), 23 March 2016 - 25 March 2016, http://dx.doi.org/10.1109/AINA.2016.141
,2016, 'Retricoin: Bitcoin based on compact proofs of retrievability', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/2833312.2833317
,2016, 'Expressive rating scheme by signatures with predications on ratees', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 363 - 379, http://dx.doi.org/10.1007/978-3-319-46298-1_24
,2016, 'On the application of clique problem for proof-of-work in cryptocurrencies', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 260 - 279, http://dx.doi.org/10.1007/978-3-319-38898-4_16
,2015, 'Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption', in 2015 IEEE Global Communications Conference (GLOBECOM), IEEE, pp. 1 - 6, presented at GLOBECOM 2015 - 2015 IEEE Global Communications Conference, 06 December 2015 - 10 December 2015, http://dx.doi.org/10.1109/glocom.2015.7417639
,2015, 'CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications', in IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE), pp. 1256 - 1261, presented at 2015 IEEE International Conference on Communications (ICC), 08 June 2015 - 12 June 2015, http://dx.doi.org/10.1109/ICC.2015.7248495
,2015, 'Achieving data survivability and confidentiality in unattended wireless sensor networks', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 239 - 246, http://dx.doi.org/10.1109/AINA.2015.191
,2015, 'Temporal access control with user revocation for cloud data', in Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, pp. 336 - 343, http://dx.doi.org/10.1109/TrustCom.2014.45
,2015, 'Decentralized access control on data in the cloud with fast encryption and outsourced decryption', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2014.7417639
,2014, 'Attribute based access control in clouds: A survey', in 2014 International Conference on Signal Processing and Communications, SPCOM 2014, http://dx.doi.org/10.1109/SPCOM.2014.6983992
,2014, 'Analyzing cascading failures in smart grids under random and targeted attacks', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 226 - 233, http://dx.doi.org/10.1109/AINA.2014.32
,2014, 'Security services using crowdsourcing', in Procedia Computer Science, pp. 505 - 512, http://dx.doi.org/10.1016/j.procs.2014.05.454
,2014, 'Should silence be heard? Fair rational secret sharing with silent and non-silent players', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 240 - 255, http://dx.doi.org/10.1007/978-3-319-12280-9_16
,2014, 'TSP 2013: Message from workshop chairs', in Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013, http://dx.doi.org/10.1109/HPCC.and.EUC.2013.350
,2013, 'Jamming resistant schemes for wireless communication: A combinatorial approach', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 43 - 62, http://dx.doi.org/10.1007/978-3-642-45204-8_4
,2013, 'NFSP 2013: Message from the chairs', in Proceedings - International Conference on Distributed Computing Systems, http://dx.doi.org/10.1109/ICDCSW.2013.73
,2013, 'Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 1836 - 1841, http://dx.doi.org/10.1109/WCNC.2013.6554843
,2013, 'Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, pp. 1023 - 1028, http://dx.doi.org/10.1109/ICIEA.2013.6566517
,2013, 'Enhanced privacy and reliability for secure geocasting in VANET', in IEEE International Conference on Communications, pp. 1599 - 1603, http://dx.doi.org/10.1109/ICC.2013.6654743
,2013, 'Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique', in Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 402 - 407, http://dx.doi.org/10.1109/GLOCOM.2013.6831104
,2012, 'Securing home networks using Physically Unclonable Functions', in ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program, pp. 288 - 293, http://dx.doi.org/10.1109/ICUFN.2012.6261713
,2012, 'Privacy preserving access control with authentication for securing data in clouds', in Proceedings - 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, pp. 556 - 563, http://dx.doi.org/10.1109/CCGrid.2012.92
,2012, 'Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks', in Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 979 - 984, http://dx.doi.org/10.1109/GLOCOM.2012.6503240
,2011, 'On data-centric misbehavior detection in VANETs', in IEEE Vehicular Technology Conference, http://dx.doi.org/10.1109/VETECF.2011.6093096
,2011, 'DACC: Distributed access control in clouds', in Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, pp. 91 - 98, http://dx.doi.org/10.1109/TrustCom.2011.15
,2011, 'Limitations of trust management schemes in VANET and countermeasures', in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, pp. 1228 - 1232, http://dx.doi.org/10.1109/PIMRC.2011.6139695
,2011, 'Distributed fine-grained access control in wireless sensor networks', in Proceedings - 25th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2011, pp. 352 - 362, http://dx.doi.org/10.1109/IPDPS.2011.42
,2011, 'Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs', in Proceedings - IEEE INFOCOM, pp. 326 - 330, http://dx.doi.org/10.1109/INFCOM.2011.5935175
,2011, 'Improved access control mechanism in vehicular ad hoc networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 191 - 205, http://dx.doi.org/10.1007/978-3-642-22450-8_15
,2011, 'Key distribution in wireless sensor networks using finite affine plane', in Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, pp. 436 - 441, http://dx.doi.org/10.1109/WAINA.2011.39
,2009, 'Key predistribution schemes using block designs inwireless sensor networks', in Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, pp. 873 - 878, http://dx.doi.org/10.1109/CSE.2009.35
,2009, 'Key predistribution schemes using codes in wireless sensor networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 275 - 288, http://dx.doi.org/10.1007/978-3-642-01440-6_22
,2008, 'Key establishment algorithms for some deterministic key predistribution schemes', in Security in Information Systems - Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008; In Conjunction with ICEIS 2008, pp. 68 - 77
,2007, 'Key predistribution using partially balanced designs in wireless sensor networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 431 - 445, http://dx.doi.org/10.1007/978-3-540-74742-0_40
,Preprints
2024, SecureVAX: A Blockchain-Enabled Secure Vaccine Passport System, http://dx.doi.org/10.48550/arxiv.2407.13852
,2024, SoK: Trusting Self-Sovereign Identity, http://dx.doi.org/10.48550/arxiv.2404.06729
,2023, One-Phase Batch Update on Sparse Merkle Trees for Rollups, http://dx.doi.org/10.48550/arxiv.2310.13328
,2023, OptimShare: A Unified Framework for Privacy Preserving Data Sharing -- Towards the Practical Utility of Data with Privacy, http://dx.doi.org/10.48550/arxiv.2306.03379
,2023, FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT, http://dx.doi.org/10.48550/arxiv.2301.09761
,2022, Cascading Failures in Smart Grids under Random, Targeted and Adaptive Attacks, http://arxiv.org/abs/2206.12735v1
,2022, SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT, http://dx.doi.org/10.48550/arxiv.2203.11914
,2022, Strategic Analysis of Griefing Attack in Lightning Network, http://dx.doi.org/10.48550/arxiv.2203.10533
,2021, Application of Blockchain in Healthcare and Health Insurance Sector, http://dx.doi.org/10.48550/arxiv.2108.00807
,2021, DIMY: Enabling Privacy-preserving Contact Tracing, http://dx.doi.org/10.48550/arxiv.2103.05873
,2020, Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain, http://dx.doi.org/10.48550/arxiv.2009.11033
,2020, A Survey of COVID-19 Contact Tracing Apps, http://dx.doi.org/10.48550/arxiv.2006.10306
,2020, A Technical Look At The Indian Personal Data Protection Bill, http://dx.doi.org/10.48550/arxiv.2005.13812
,