default search action
Anish Mathuria
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i4]Pranav Verma, Anish Mathuria, Sourish Dasgupta:
Efficient privacy preserving top-k recommendation using homomorphic sorting. IACR Cryptol. ePrint Arch. 2022: 1564 (2022) - 2021
- [c29]Pranav Verma, Anish Mathuria, Sourish Dasgupta:
Faster Private Rating Update via Integer-Based Homomorphic Encryption. ICISS 2021: 218-236 - 2020
- [b2]Colin Boyd, Anish Mathuria, Douglas Stebila:
Protocols for Authentication and Key Establishment, Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-58145-2, pp. 1-440 - [c28]Ganeshsai Garikipati, Roshani, Anish Mathuria, Priyanka Singh:
HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption. SPACE 2020: 147-166 - [c27]Dhrumil Patel, Aditya Basu, Anish Mathuria:
Automatic Generation of Compact Printable Shellcodes for x86. WOOT @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [j3]Naveen Kumar, Anish Mathuria:
Comprehensive evaluation of key management hierarchies for outsourced data. Cybersecur. 2(1): 8 (2019) - [c26]Pranav Verma, Anish Mathuria, Sourish Dasgupta:
Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements. ICISS 2019: 218-238 - 2018
- [c25]Harshul Vaishnav, Anish Mathuria:
Fast Private License Plate Matching Using Symmetric Homomorphic Encryption. ANTS 2018: 1-6 - [c24]Pranav Verma, Harshul Vaishnav, Anish Mathuria, Sourish Dasgupta:
An Enhanced Privacy-Preserving Recommender System. ISEA-ISAP 2018: 247-260 - 2017
- [c23]Naveen Kumar, Anish Mathuria:
Improved Write Access Control and Stronger Freshness Guarantee to Outsourced Data. ICDCN 2017: 19 - [c22]Varun Garg, Anish Mathuria:
On Automated Detection of Multi-Protocol Attacks Using AVISPA. ICISS 2017: 179-193 - [c21]Ronak Odhaviya, Anamika Modi, Rahi Sheth, Anish Mathuria:
Feasibility of idle port scanning using RST rate-limit. SIN 2017: 224-228 - [c20]Harshul Vaishnav, Smriti Sharma, Anish Mathuria:
Efficient Implementation of Private License Plate Matching Protocols. SPACE 2017: 281-294 - [p1]Naveen Kumar, Anish Mathuria:
Security and Privacy Issues in Outsourced Personal Health Record. Research Advances in Cloud Computing 2017: 431-447 - 2016
- [c19]Harshil Sokhadia, Anish Mathuria:
A Tool for Visualizing Concurrent C Programs Using Graphs. T4E 2016: 236-237 - 2015
- [c18]Payal Chaudhari, Manik Lal Das, Anish Mathuria:
On Anonymous Attribute Based Encryption. ICISS 2015: 378-392 - [c17]Sarita Agrawal, Manik Lal Das, Anish Mathuria, Sanjay Srivastava:
Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network. ICISS 2015: 419-440 - [c16]Naveen Kumar, Anish Mathuria, Manik Lal Das:
Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud. SSCC 2015: 36-44 - [c15]Naveen Kumar, Anish Mathuria, Manik Lal Das:
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System. TrustCom/BigDataSE/ISPA (1) 2015: 1249-1254 - 2014
- [c14]Aditya Basu, Anish Mathuria, Nagendra Chowdary:
Automatic Generation of Compact Alphanumeric Shellcodes for x86. ICISS 2014: 399-410 - [i3]Payal Chaudhari, Manik Lal Das, Anish Mathuria:
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13. IACR Cryptol. ePrint Arch. 2014: 1028 (2014) - 2013
- [c13]Naveen Kumar, Anish Mathuria, Manik Lal Das, Kanta Matsuura:
Improving security and efficiency of time-bound access to outsourced data. COMPUTE 2013: 9:1-9:8 - [c12]Naveen Kumar, Anish Mathuria, Manik Lal Das:
Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper). ICISS 2013: 191-198 - [c11]Pratik Kumar, Nagendra Chowdary, Anish Mathuria:
Alphanumeric Shellcode Generator for ARM Architecture. SPACE 2013: 38-39 - 2012
- [c10]Anil Mundra, Anish Mathuria, Manik Lal Das:
Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation. ICDCIT 2012: 166-176 - [c9]Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier López:
A Novel Key Update Protocol in Mobile Sensor Networks. ICISS 2012: 194-207 - [c8]Anshu Yadav, Anish Mathuria:
Towards Formal Analysis of Key Control in Group Key Agreement Protocols. SPACE 2012: 77-93 - 2010
- [e1]Somesh Jha, Anish Mathuria:
Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings. Lecture Notes in Computer Science 6503, Springer 2010, ISBN 978-3-642-17713-2 [contents]
2000 – 2009
- 2008
- [i2]Anish Mathuria, G. Sriram:
New attacks on ISO key establishment protocols. IACR Cryptol. ePrint Arch. 2008: 336 (2008) - 2007
- [c7]Anshul Singhal, Vaibhav Garg, Anish Mathuria:
Analysis and Enhancement of Two Key Agreement Protocols for Wireless Networks. COMSWARE 2007 - 2006
- [c6]Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria:
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. ACISP 2006: 371-382 - [c5]Praveen Kumar Vadnala, Anish Mathuria:
An Efficient Key Assignment Scheme for Access Control in a Hierarchy. ICISS 2006: 205-219 - 2005
- [i1]Anish Mathuria, Vipul Jain:
On Efficient Key Agreement Protocols. IACR Cryptol. ePrint Arch. 2005: 64 (2005) - 2004
- [c4]Pawan Jadia, Anish Mathuria:
Efficient Secure Aggregation in Sensor Networks. HiPC 2004: 40-49 - 2003
- [b1]Colin Boyd, Anish Mathuria:
Protocols for Authentication and Key Establishment. Information Security and Cryptography, Springer 2003, ISBN 978-3-642-07716-6, pp. I-XXIV, 1-323 - 2002
- [c3]Anish Mathuria:
Using a Formal Technique for Protocol Idealization: A Cautionary Note. DEXA Workshops 2002: 468-472 - 2000
- [j2]Colin Boyd, Anish Mathuria:
Key establishment protocols for secure mobile communications: a critical survey. Comput. Commun. 23(5-6): 575-587 (2000)
1990 – 1999
- 1999
- [c2]Michiharu Kudo, Anish Mathuria:
An Extended Logic for Analyzing Timed-Release Public-Key Protocols. ICICS 1999: 183-198 - 1998
- [j1]Anish Mathuria:
Comparing lower bounds on messages and rounds for two classes of key establishment protocols. Comput. Commun. Rev. 28(5): 91-98 (1998) - [c1]Colin Boyd, Anish Mathuria:
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. ACISP 1998: 344-355
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint