Select Publications
Journal articles
2024, 'Efficient keyword search on encrypted dynamic cloud data', Advances in Mathematics of Communications, 18, pp. 1442 - 1470, http://dx.doi.org/10.3934/amc.2022101
,2024, 'Electric Vehicle Next Charge Location Prediction', IEEE Transactions on Intelligent Transportation Systems, http://dx.doi.org/10.1109/TITS.2024.3401703
,2024, 'SoK: Trusting Self-Sovereign Identity', Proceedings on Privacy Enhancing Technologies, 2024, pp. 297 - 313, http://dx.doi.org/10.56553/popets-2024-0079
,2023, 'Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain', Sensors (Basel, Switzerland), 23, http://dx.doi.org/10.3390/s23208352
,2023, 'Accelerated Verifiable Fair Digital Exchange', Distributed Ledger Technologies: Research and Practice, 2, pp. 1 - 24, http://dx.doi.org/10.1145/3596448
,2023, 'FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT', IEEE Transactions on Network and Service Management, 20, pp. 2929 - 2941, http://dx.doi.org/10.1109/TNSM.2023.3239832
,2023, 'Strategic Analysis of Griefing Attack in Lightning Network', IEEE Transactions on Network and Service Management, 20, pp. 1790 - 1803, http://dx.doi.org/10.1109/TNSM.2022.3230768
,2023, 'CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1060 - 1073, http://dx.doi.org/10.1109/TDSC.2022.3148476
,2022, 'A Digital Asset Inheritance Model to Convey Online Persona Posthumously', International Journal of Information Security, 21, pp. 983 - 1003, http://dx.doi.org/10.1007/s10207-022-00593-8
,2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, 202, http://dx.doi.org/10.1016/j.jnca.2022.103356
,2022, 'Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques', IEEE Transactions on Cloud Computing, 10, pp. 2090 - 2101, http://dx.doi.org/10.1109/TCC.2020.3000342
,2021, 'Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie', Automatic Control and Computer Sciences, 55, pp. 319 - 333, http://dx.doi.org/10.3103/S0146411621040039
,2021, 'A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0', IEEE Transactions on Industrial Informatics, 17, pp. 2316 - 2324, http://dx.doi.org/10.1109/TII.2020.2998105
,2021, 'Design of Anonymous Endorsement System in Hyperledger Fabric', IEEE Transactions on Emerging Topics in Computing, 9, pp. 1780 - 1791, http://dx.doi.org/10.1109/TETC.2019.2920719
,2020, 'A parallelized disjunctive query based searchable encryption scheme for big data', Future Generation Computer Systems, 109, pp. 583 - 592, http://dx.doi.org/10.1016/j.future.2018.05.048
,2020, 'A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT', Journal of Network and Computer Applications, 149, http://dx.doi.org/10.1016/j.jnca.2019.102481
,2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226
,2020, 'Efficient Decentralized Attribute Based Access Control for Mobile Clouds', IEEE Transactions on Cloud Computing, 8, pp. 124 - 137, http://dx.doi.org/10.1109/TCC.2017.2754255
,2020, 'Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage', IEEE Transactions on Cloud Computing, 8, pp. 138 - 151, http://dx.doi.org/10.1109/TCC.2017.2767584
,2019, 'The secure link prediction problem', Advances in Mathematics of Communications, 13, pp. 733 - 757, http://dx.doi.org/10.3934/amc.2019043
,2019, 'A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data', IEEE Transactions on Emerging Topics in Computing, 7, pp. 530 - 544, http://dx.doi.org/10.1109/TETC.2017.2737789
,2019, 'Maximal contrast color visual secret sharing schemes', Designs, Codes, and Cryptography, 87, pp. 1699 - 1711, http://dx.doi.org/10.1007/s10623-018-0570-6
,2019, 'Understanding Vulnerability of Communities in Complex Networks', , http://dx.doi.org/10.48550/arxiv.1906.05238
,2019, 'Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment', Computer Communications, 133, pp. 102 - 114, http://dx.doi.org/10.1016/j.comcom.2018.08.004
,2018, 'On the economic significance of ransomware campaigns: A Bitcoin transactions perspective', Computers and Security, 79, pp. 162 - 189, http://dx.doi.org/10.1016/j.cose.2018.08.008
,2018, 'A survey on security and privacy issues of bitcoin', IEEE Communications Surveys and Tutorials, 20, pp. 3416 - 3452, http://dx.doi.org/10.1109/COMST.2018.2842460
,2018, 'Key predistribution using transversal design on a grid of wireless sensor network', Ad-Hoc and Sensor Wireless Networks, 5, pp. 247 - 264
,2018, 'Security issues in named data networks', Computer, 51, pp. 66 - 75, http://dx.doi.org/10.1109/MC.2018.1151010
,2017, 'Bitcoin Block Withholding Attack: Analysis and Mitigation', IEEE Transactions on Information Forensics and Security, 12, pp. 1967 - 1978, http://dx.doi.org/10.1109/TIFS.2016.2623588
,2017, 'A Graph Analytics Framework for Ranking Authors, Papers and Venues', , http://arxiv.org/abs/1708.00329v1
,2014, 'Decentralized access control with anonymous authentication of data stored in clouds', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 384 - 394, http://dx.doi.org/10.1109/TPDS.2013.38
,2014, 'A social network approach to trust management in VANETs', Peer-to-Peer Networking and Applications, 7, pp. 229 - 242, http://dx.doi.org/10.1007/s12083-012-0136-8
,2014, 'Applying transmission-coverage algorithms for secure geocasting in VANETs', International Journal of Computational Science and Engineering, 1, pp. 1 - 1, http://dx.doi.org/10.1504/ijcse.2014.10006161
,2013, 'Pairwise and triple key distribution in wireless sensor networks with applications', IEEE Transactions on Computers, 62, pp. 2224 - 2237, http://dx.doi.org/10.1109/TC.2012.138
,2013, 'A decentralized security framework for data aggregation and access control in smart grids', IEEE Transactions on Smart Grid, 4, pp. 196 - 205, http://dx.doi.org/10.1109/TSG.2012.2224389
,2012, 'Combinatorial batch codes: A lower bound and optimal constructions', Advances in Mathematics of Communications, 6, pp. 165 - 174, http://dx.doi.org/10.3934/amc.2012.6.165
,2012, 'Improved distinguishers for HC-128', Designs, Codes, and Cryptography, 63, pp. 225 - 240, http://dx.doi.org/10.1007/s10623-011-9550-9
,2011, 'Key pre-distribution using partially balanced designs in wireless sensor networks', International Journal of High Performance Computing and Networking, 7, pp. 19 - 28, http://dx.doi.org/10.1504/IJHPCN.2011.038707
,2009, 'Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks', ACM Transactions on Sensor Networks, 6, http://dx.doi.org/10.1145/1653760.1653764
,2009, 'Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme', International Journal of Distributed Sensor Networks, 5, pp. 660 - 674, http://dx.doi.org/10.1080/15501320802581466
,