Efficient query processing on outsourced encrypted data in cloud with privacy preservation BR Purushothama, BB Amberker 2012 International Symposium on Cloud and Services Computing, 88-95, 2012 | 19 | 2012 |
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage G Pareek, BR Purushothama Journal of information security and applications 63, 103009, 2021 | 16 | 2021 |
Group‐oriented encryption for dynamic groups with constant rekeying cost K Nishat, BR Purushothama Security and communication networks 9 (17), 4120-4137, 2016 | 16 | 2016 |
Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks SM Patil, BR Purushothama Journal of Information Security and Applications 50, 102411, 2020 | 14 | 2020 |
Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud BR Purushothama, B Shrinath, BB Amberker International Journal of Information and Communication Technology 5 (2), 167-186, 2013 | 14 | 2013 |
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance G Pareek, BR Purushothama Journal of Information Security and Applications 54, 102543, 2020 | 13 | 2020 |
Rsa-based collusion resistant quorum controlled proxy re-encryption scheme for distributed secure communication SM Patil, BR Purushothama International Conference on Distributed Computing and Internet Technology …, 2018 | 12 | 2018 |
Design and implementation of secure internet based voting system with user anonymity using identity based encryption system BR Purushothama, AR Pais 2009 IEEE International Conference on Services Computing, 474-481, 2009 | 12 | 2009 |
Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time G Pareek, BR Purushothama Sādhanā 43 (9), 137, 2018 | 10 | 2018 |
Pixel co-ordinate-based secret image sharing scheme with constant size shadow images SM Patil, BR Purushothama Computers & Electrical Engineering 89, 106937, 2021 | 9 | 2021 |
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes. G Pareek, BR Purushothama SECRYPT, 519-524, 2017 | 9 | 2017 |
Design of an efficient verification scheme for correctness of outsourced computations in cloud computing R Vyas, A Singh, J Singh, G Soni, BR Purushothama Security in Computing and Communications: Third International Symposium …, 2015 | 7 | 2015 |
Diagnosis of coronavirus disease from chest x-ray images using DenseNet-169 architecture PP Dalvi, DR Edla, BR Purushothama SN Computer Science 4 (3), 214, 2023 | 6 | 2023 |
Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model A Chaudhari, G Pareek, BR Purushothama 2017 International Conference on Advances in Computing, Communications and …, 2017 | 6 | 2017 |
Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model BR Purushothama, N Koti 2015 International Conference on Advances in Computing, Communications and …, 2015 | 6 | 2015 |
Group key management scheme for simultaneous multiple groups with overlapped membership BR Purushothama, BB Amberker 2011 Third International Conference on Communication Systems and Networks …, 2011 | 6 | 2011 |
Cryptanalysis of a secure and efficient Diffie–Hellman based key agreement scheme P Sharma, BR Purushothama International Journal of Information Technology 15 (2), 981-989, 2023 | 5 | 2023 |
Proxy re-encryption scheme for access control enforcement delegation on outsourced data in public cloud G Pareek, BR Purushothama International Conference on Information Systems Security, 251-271, 2018 | 5 | 2018 |
Security analysis of group key management schemes of wireless sensor network under active outsider adversary model BR Purushothama, AP Verma 2017 International Conference on Advances in Computing, Communications and …, 2017 | 5 | 2017 |
CCA secure and efficient proxy re-encryption scheme without bilinear pairing S Prasad, BR Purushothama Journal of Information Security and Applications 58, 102703, 2021 | 4 | 2021 |