Suivre
Sreenivasa Rao Y
Titre
Citée par
Citée par
Année
A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing
YS Rao
Future Generation Computer Systems 67, 133-151, 2017
1452017
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
V Odelu, AK Das, YS Rao, S Kumari, MK Khan, KKR Choo
Computer Standards & Interfaces 54, 3-9, 2017
1132017
Efficient attribute-based signature and signcryption realizing expressive access structures
YS Rao, R Dutta
International Journal of Information Security 15, 81-109, 2016
562016
Recipient anonymous ciphertext-policy attribute based encryption
YS Rao, R Dutta
Information Systems Security: 9th International Conference, ICISS 2013 …, 2013
362013
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model
YS Rao, R Dutta
Australasian Conference on Information Security and Privacy, 209-225, 2014
272014
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party
D Mishra, D Dharminder, P Yadav, YS Rao, P Vijayakumar, N Kumar
Journal of Information Security and Applications 55, 102648, 2020
262020
Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption
YS Rao, R Dutta
Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International …, 2013
222013
Computational friendly attribute-based encryptions with short ciphertext
YS Rao, R Dutta
Theoretical Computer Science 668, 1-26, 2017
172017
Expressive attribute based signcryption with constant-size ciphertext
YS Rao, R Dutta
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
162014
Attribute‐based online/offline signcryption scheme
YS Rao
International Journal of Communication Systems 30 (16), e3322, 2017
152017
Computationally efficient expressive key-policy attribute based encryption schemes with constant-size ciphertext
YS Rao, R Dutta
Information and Communications Security: 15th International Conference …, 2013
142013
Dynamic ciphertext-policy attribute-based encryption for expressive access policy
YS Rao, R Dutta
Distributed Computing and Internet Technology: 10th International Conference …, 2014
122014
Computationally efficient dual-policy attribute based encryption with short ciphertext
YS Rao, R Dutta
Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013
122013
Efficient attribute based access control mechanism for vehicular ad hoc network
YS Rao, R Dutta
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
112013
Attribute-based key-insulated signature for boolean formula
Y Sreenivasa Rao, R Dutta
International Journal of Computer Mathematics 93 (6), 864-888, 2016
82016
Bandwidth-efficient attribute-based key-insulated signatures with message recovery
YS Rao, R Dutta
Information Sciences 369, 648-673, 2016
72016
Computationally efficient secure access control for vehicular ad hoc networks
YS Rao, R Dutta
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
72012
Fully secure bandwidth‐efficient anonymous ciphertext‐policy attribute‐based encryption
Y Sreenivasa Rao, R Dutta
Security and Communication Networks 8 (18), 4157-4176, 2015
52015
Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment
S Bera, S Prasad, YS Rao, AK Das, Y Park
Journal of Information Security and Applications 75, 103482, 2023
42023
Privacy-preserving decentralized key-policy attribute-based encryption schemes with fast decryption
YS Rao
Information Systems Security: 11th International Conference, ICISS 2015 …, 2015
32015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20