Select Publications
Preprints
2024, SecureVAX: A Blockchain-Enabled Secure Vaccine Passport System, http://dx.doi.org/10.48550/arxiv.2407.13852
,2024, SoK: Trusting Self-Sovereign Identity, http://dx.doi.org/10.48550/arxiv.2404.06729
,2023, One-Phase Batch Update on Sparse Merkle Trees for Rollups, http://dx.doi.org/10.48550/arxiv.2310.13328
,2023, OptimShare: A Unified Framework for Privacy Preserving Data Sharing -- Towards the Practical Utility of Data with Privacy, http://dx.doi.org/10.48550/arxiv.2306.03379
,2023, FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT, http://dx.doi.org/10.48550/arxiv.2301.09761
,2022, Cascading Failures in Smart Grids under Random, Targeted and Adaptive Attacks, http://arxiv.org/abs/2206.12735v1
,2022, SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT, http://dx.doi.org/10.48550/arxiv.2203.11914
,2022, Strategic Analysis of Griefing Attack in Lightning Network, http://dx.doi.org/10.48550/arxiv.2203.10533
,2021, Application of Blockchain in Healthcare and Health Insurance Sector, http://dx.doi.org/10.48550/arxiv.2108.00807
,2021, DIMY: Enabling Privacy-preserving Contact Tracing, http://dx.doi.org/10.48550/arxiv.2103.05873
,2020, Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain, http://dx.doi.org/10.48550/arxiv.2009.11033
,2020, A Survey of COVID-19 Contact Tracing Apps, http://dx.doi.org/10.48550/arxiv.2006.10306
,2020, A Technical Look At The Indian Personal Data Protection Bill, http://dx.doi.org/10.48550/arxiv.2005.13812
,2020, Griefing-Penalty: Countermeasure for Griefing Attack in Lightning Network, http://dx.doi.org/10.48550/arxiv.2005.09327
,2020, CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments, http://dx.doi.org/10.48550/arxiv.2005.07574
,2020, A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0, http://dx.doi.org/10.48550/arxiv.2005.07147
,2020, HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments, http://dx.doi.org/10.48550/arxiv.2002.05071
,2020, Verifiable and Auditable Digital Interchange Framework, http://dx.doi.org/10.48550/arxiv.2001.03717
,2019, FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme, http://dx.doi.org/10.48550/arxiv.1910.00034
,2019, Cumulus: Blockchain-Enabled Privacy Preserving Data Audit in Cloud, http://dx.doi.org/10.48550/arxiv.1904.12362
,2019, The Secure Link Prediction Problem, http://dx.doi.org/10.48550/arxiv.1901.11308
,2018, Blockchain Enabled Data Marketplace -- Design and Challenges, http://dx.doi.org/10.48550/arxiv.1811.11462
,2018, Design of Anonymous Endorsement System in Hyperledger Fabric, http://dx.doi.org/10.48550/arxiv.1811.01410
,2018, An Efficient Secure Distributed Cloud Storage for Append-only Data, http://dx.doi.org/10.48550/arxiv.1805.02970
,2018, On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective, http://dx.doi.org/10.48550/arxiv.1804.01341
,2017, Keyword-Based Delegable Proofs of Storage, http://dx.doi.org/10.48550/arxiv.1712.04417
,2017, Cloud Data Auditing Using Proofs of Retrievability, http://dx.doi.org/10.48550/arxiv.1711.06039
,2017, A Survey on Security and Privacy Issues of Bitcoin, http://dx.doi.org/10.48550/arxiv.1706.00916
,2017, Certificate Transparency with Enhancements and Short Proofs, http://dx.doi.org/10.48550/arxiv.1704.04937
,2016, Secure Cloud Storage Protocols with Data Dynamics Using Secure Network Coding Techniques, http://dx.doi.org/10.48550/arxiv.1612.08029
,2016, Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage, http://dx.doi.org/10.48550/arxiv.1611.03982
,2016, Preferential Attachment Model with Degree Bound and its Application to Key Predistribution in WSN, http://dx.doi.org/10.48550/arxiv.1604.00590
,2015, CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications, http://dx.doi.org/10.48550/arxiv.1501.04894
,2014, Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks, http://dx.doi.org/10.48550/arxiv.1402.6809
,2011, A Security Architecture for Data Aggregation and Access Control in Smart Grids, http://dx.doi.org/10.48550/arxiv.1111.2619
,2011, Data-centric Misbehavior Detection in VANETs, http://dx.doi.org/10.48550/arxiv.1103.2404
,2011, Combinatorial Batch Codes: A Lower Bound and Optimal Constructions, http://dx.doi.org/10.48550/arxiv.1102.4951
,2008, More on Combinatorial Batch Codes, http://dx.doi.org/10.48550/arxiv.0809.3357
,