default search action
Syam Kumar Pasupuleti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Gudipati Sravya, Syam Kumar Pasupuleti, R. Padmavathy:
Survey of Post-Quantum Lattice-Based Ciphertext-Policy Attribute-Based Encryption Schemes for Cloud Storage: Taxonomy, Open Issues, and Future Directions. IEEE Trans. Serv. Comput. 17(6): 4540-4557 (2024) - [c5]Renuka Cheeturi, Syam Kumar Pasupuleti, Rashmi Ranjan Rout:
Lattice-Based Efficient Certificateless Public Auditing Scheme from RLWE for Cloud Storage. CCGridW 2024: 26-33 - 2023
- [j21]Umasankararao Varri, Syam Kumar Pasupuleti, K. V. Kadambari:
Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage. J. Ambient Intell. Humaniz. Comput. 14(9): 11455-11467 (2023) - [j20]Vamshi Adouth, Eswari Rajagopal, Syam Kumar Pasupuleti:
EB-CSPA: efficient blockchain-based certificateless short signature public auditing scheme for cloud-based cyber-physical systems. J. Electronic Imaging 32(2) (2023) - 2022
- [j19]Medikonda Asha Kiran, Syam Kumar Pasupuleti, Eswari Rajagopal:
Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT. Int. J. Cloud Appl. Comput. 12(1): 1-15 (2022) - [j18]Umasankararao Varri, Sreekanth Kasani, Syam Kumar Pasupuleti, K. V. Kadambari:
FELT-ABKS: Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data. IEEE Internet Things J. 9(10): 7559-7571 (2022) - [j17]Umasankararao Varri, Syam Kumar Pasupuleti, K. V. Kadambari:
Traceable and revocable multi-authority attribute-based keyword search for cloud storage. J. Syst. Archit. 132: 102745 (2022) - [j16]Medikonda Asha Kiran, Syam Kumar Pasupuleti, Eswari Rajagopal:
A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT. Peer-to-Peer Netw. Appl. 15(5): 2390-2403 (2022) - 2021
- [j15]Jaya Rao Gudeme, Syam Kumar Pasupuleti, Ramesh Kandukuri:
Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage. Comput. Secur. 103: 102176 (2021) - [j14]Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse:
Dynamic traceable CP-ABE with revocation for outsourced big data in cloud storage. Int. J. Commun. Syst. 34(2) (2021) - [j13]Jaya Rao Gudeme, Syam Kumar Pasupuleti, Ramesh Kandukuri:
Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage. J. Ambient Intell. Humaniz. Comput. 12(2): 2019-2032 (2021) - [j12]Jaya Rao Gudeme, Syamkumar Pasupuleti, Ramesh Kandukuri:
Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage. J. Parallel Distributed Comput. 156: 163-175 (2021) - [j11]Praveen Kumar Premkamal, Syam Kumar Pasupuleti, Abhishek Kumar Singh, P. J. A. Alphonse:
Enhanced attribute based access control with secure deduplication for big data storage in cloud. Peer-to-Peer Netw. Appl. 14(1): 102-120 (2021) - [j10]Umasankararao Varri, Syam Kumar Pasupuleti, K. V. Kadambari:
CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage. Peer-to-Peer Netw. Appl. 14(3): 1290-1302 (2021) - 2020
- [j9]Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse:
Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud. Int. J. Cloud Appl. Comput. 10(1): 28-45 (2020) - [j8]Umasankararao Varri, Syamkumar Pasupuleti, K. V. Kadambari:
A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments. J. Supercomput. 76(4): 3013-3042 (2020) - [c4]Umasankararao Varri, Syam Kumar Pasupuleti, K. V. Kadambari:
Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing. CCGRID 2020: 450-458 - [p1]Dharavath Ramesh, Syam Kumar Pasupuleti:
A Novel AckIBE-Based Secure Cloud Data Management Framework. Handbook of Computer Networks and Cyber Security 2020: 91-110
2010 – 2019
- 2019
- [j7]Syam Kumar Pasupuleti:
Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code. Int. J. Cloud Appl. Comput. 9(4): 1-20 (2019) - [j6]Jaya Rao Gudeme, Syam Kumar Pasupuleti, Ramesh Kandukuri:
Review of remote data integrity auditing schemes in cloud computing: taxonomy, analysis, and open issues. Int. J. Cloud Comput. 8(1): 20-49 (2019) - [j5]Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse:
Efficient revocable CP-ABE for big data access control in cloud computing. Int. J. Secur. Networks 14(3): 119-132 (2019) - [j4]Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse:
A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. J. Ambient Intell. Humaniz. Comput. 10(7): 2693-2707 (2019) - 2018
- [j3]Syam Kumar Pasupuleti:
Effective and secure data storage in multi-cloud storage architectures. Int. J. Inf. Commun. Technol. 12(1/2): 74-97 (2018) - [j2]Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse:
Attribute based encryption in cloud computing: A survey, gap analysis, and future directions. J. Netw. Comput. Appl. 108: 37-52 (2018) - [c3]Jeswanth Maseedu, Syam Kumar Pasupuleti:
Attribute based Range Search over Encrypted Data for Privacy Preserving in Cloud Computing. ICACCI 2018: 323-329 - [c2]Mayank Kumar, Syam Kumar Pasupuleti:
Lightweight Verifiable Auditing for Outsourced Database in Cloud Computing. ICDCIT 2018: 280-287 - 2016
- [j1]Syam Kumar Pasupuleti, Subramanian Ramalingam, Rajkumar Buyya:
An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J. Netw. Comput. Appl. 64: 12-22 (2016) - 2015
- [c1]Sourabh Bhagat, Syam Kumar Pasupuleti:
Simulated Raindrop Algorithm to Mitigate DDoS Attacks in Cloud Computing. ICCCT 2015: 412-418
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-26 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint