Select Publications
Conference Papers
2024, 'Blockchain-Enabled Private and Secure Task Allocation Framework', in 2024 16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024, pp. 666 - 670, http://dx.doi.org/10.1109/COMSNETS59351.2024.10427531
,2024, 'Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 3 - 38, http://dx.doi.org/10.1007/978-3-031-68376-3_1
,2024, 'Zero-Knowledge Proofs for Blockchains', in Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2024, pp. 67 - 68, http://dx.doi.org/10.1109/DSN-S60304.2024.00028
,2023, 'ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness', in Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, ACM, pp. 1 - 10, presented at ASIA CCS '23: ACM Asia Conference on Computer and Communications Security, http://dx.doi.org/10.1145/3594556.3594608
,2023, 'Encoding of security properties for transparent consent data processing', in 2023 IEEE Guwahati Subsection Conference, GCON 2023, http://dx.doi.org/10.1109/GCON58516.2023.10183463
,2022, 'Blockchain-Enabled Secure and Smart Healthcare System', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), St. Petersburg, Florida, The United States of America, pp. 97 - 109, presented at 17th International Conference on Design Science Research in Information Systems and Technology, DESTRIST 2022, St. Petersburg, Florida, The United States of America, 01 June 2022 - 03 June 2022, http://dx.doi.org/10.1007/978-3-031-06516-3_8
,2022, 'SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT', in Proceedings - 22nd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2022, pp. 249 - 258, http://dx.doi.org/10.1109/CCGrid54584.2022.00034
,2021, 'Towards privacy-preserving digital contact tracing', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021, http://dx.doi.org/10.1109/ICBC51069.2021.9461052
,2021, 'Blockchain Enabled Data Trading with User Consent', in 2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021, pp. 263 - 271, http://dx.doi.org/10.1109/COMSNETS51098.2021.9352817
,2021, 'Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data', in 2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021, pp. 465 - 473, http://dx.doi.org/10.1109/COMSNETS51098.2021.9352809
,2021, 'Energy Blockchain for Demand Response and Distributed Energy Resource Management', in 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2021, pp. 425 - 431, http://dx.doi.org/10.1109/SmartGridComm51999.2021.9632326
,2020, 'Time is money: Countering griefing attack in lightning network', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 1036 - 1043, http://dx.doi.org/10.1109/TrustCom50675.2020.00138
,2020, 'Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain', in Proceedings - 2020 IEEE International Conference on Blockchain, Blockchain 2020, pp. 365 - 370, http://dx.doi.org/10.1109/Blockchain50366.2020.00053
,2020, 'HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, http://dx.doi.org/10.1109/ICBC48266.2020.9169405
,2020, 'Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 198 - 217, http://dx.doi.org/10.1007/978-3-030-65610-2_13
,2020, 'Public Key Infrastructure for Named Data Networks', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3369740.3369790
,2019, 'LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie', in International Symposium on Advanced Networks and Telecommunication Systems, ANTS, http://dx.doi.org/10.1109/ANTS47819.2019.9117924
,2019, 'Message from the chairs', in DATA 2019 - Proceedings of the 2nd ACM Workshop on Data Acquisition To Analysis, Part of SenSys 2019
,2019, 'BCC'19 chairs' welcome', in BCC 2019 - Proceedings of the 3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts, co-located with AsiaCCS 2019, pp. III
,2019, 'BlockV: A blockchain enabled peer-peer ride sharing service', in Proceedings - 2019 2nd IEEE International Conference on Blockchain, Blockchain 2019, pp. 463 - 468, http://dx.doi.org/10.1109/Blockchain.2019.00070
,2019, 'Rational Mining of Bitcoin', in 2019 11th International Conference on Communication Systems and Networks, COMSNETS 2019, pp. 1 - 8, http://dx.doi.org/10.1109/COMSNETS.2019.8711445
,2019, 'End to end secure anonymous communication for secure directed diffusion in IoT', in ACM International Conference Proceeding Series, pp. 445 - 450, http://dx.doi.org/10.1145/3288599.3295577
,2019, 'FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 355 - 371, http://dx.doi.org/10.1007/978-3-030-31919-9_23
,2018, 'An efficient and secure directed diffusion in industrial wireless sensor networks', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 41 - 46, http://dx.doi.org/10.1145/3243318.3243320
,2018, 'An Efficient Secure Distributed Cloud Storage for Append-Only Data', in IEEE International Conference on Cloud Computing, CLOUD, pp. 146 - 153, http://dx.doi.org/10.1109/CLOUD.2018.00026
,2018, 'BlockStore: A secure decentralized storage framework on blockchain', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 1096 - 1103, http://dx.doi.org/10.1109/AINA.2018.00157
,2018, 'Data forwarding and update propagation in grid network for NDN: A low-overhead approach', in International Symposium on Advanced Networks and Telecommunication Systems, ANTS, http://dx.doi.org/10.1109/ANTS.2018.8710136
,2018, 'Secrecy performance analysis of relay selection in adaptive DF relaying network with active adversary', in 11th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2017, pp. 1 - 6, http://dx.doi.org/10.1109/ANTS.2017.8384089
,2018, 'BCC'18 chairs' welcome', in BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018, pp. iii
,2018, 'On blockchain-based authorization architecture for beyond-5G mobile services', in 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, pp. 136 - 141, http://dx.doi.org/10.23919/ICITST.2017.8356363
,2018, 'A Blockchain Framework for Insurance Processes', in 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings, pp. 1 - 4, http://dx.doi.org/10.1109/NTMS.2018.8328731
,2018, 'Applying transmission-coverage algorithms for secure geocasting in VANETs', in International Journal of Computational Science and Engineering, pp. 17 - 26, http://dx.doi.org/10.1504/IJCSE.2018.089574
,2018, 'Keyword-based delegable proofs of storage', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 282 - 298, http://dx.doi.org/10.1007/978-3-319-99807-7_17
,2018, 'Secure computation of inner product of vectors with distributed entries and its applications to SVM', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 533 - 543, http://dx.doi.org/10.1007/978-3-319-99807-7_34
,2017, 'An efficient disjunctive query enabled ranked searchable encryption scheme', in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, pp. 425 - 432, http://dx.doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.267
,2017, 'Fast real-time authentication scheme for smart grids', in IoTSec 2017 - Proceedings of the ACM Workshop on Internet of Things (IoT) Security: Issues and Innovations, http://dx.doi.org/10.1145/3084030.3084033
,2017, 'BCC'17 chairs' Welcome', in BCC 2017 - Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, co-located with ASIA CCS 2017, pp. iii
,2017, 'Certificate transparency with enhancements and short proofs', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 381 - 389, http://dx.doi.org/10.1007/978-3-319-59870-3_22
,2016, 'Publicly verifiable secure cloud storage for dynamic data using secure network coding', in ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 107 - 118, http://dx.doi.org/10.1145/2897845.2897915
,2016, 'Failure tolerant rational secret sharing', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 925 - 932, http://dx.doi.org/10.1109/AINA.2016.65
,2016, 'Message from the STPA 2016 Workshop Organizers', in Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016, pp. lxviii, http://dx.doi.org/10.1109/WAINA.2016.215
,2016, 'Preferential attachment model with degree bound and its application to key predistribution in WSN', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, Institute of Electrical and Electronics Engineers (IEEE), pp. 677 - 683, presented at 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), 23 March 2016 - 25 March 2016, http://dx.doi.org/10.1109/AINA.2016.141
,2016, 'Retricoin: Bitcoin based on compact proofs of retrievability', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/2833312.2833317
,2016, 'Expressive rating scheme by signatures with predications on ratees', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 363 - 379, http://dx.doi.org/10.1007/978-3-319-46298-1_24
,2016, 'On the application of clique problem for proof-of-work in cryptocurrencies', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 260 - 279, http://dx.doi.org/10.1007/978-3-319-38898-4_16
,2015, 'Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption', in 2015 IEEE Global Communications Conference (GLOBECOM), IEEE, pp. 1 - 6, presented at GLOBECOM 2015 - 2015 IEEE Global Communications Conference, 06 December 2015 - 10 December 2015, http://dx.doi.org/10.1109/glocom.2015.7417639
,2015, 'CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications', in IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE), pp. 1256 - 1261, presented at 2015 IEEE International Conference on Communications (ICC), 08 June 2015 - 12 June 2015, http://dx.doi.org/10.1109/ICC.2015.7248495
,2015, 'Achieving data survivability and confidentiality in unattended wireless sensor networks', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 239 - 246, http://dx.doi.org/10.1109/AINA.2015.191
,2015, 'Temporal access control with user revocation for cloud data', in Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, pp. 336 - 343, http://dx.doi.org/10.1109/TrustCom.2014.45
,2015, 'Decentralized access control on data in the cloud with fast encryption and outsourced decryption', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2014.7417639
,