Raghav Bhaskar
Raghav Bhaskar
Researcher Cryptography and Privacy
Verified email at csiro.au
TitleCited byYear
Discovering frequent patterns in sensitive data
R Bhaskar, S Laxman, A Smith, A Thakurta
Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010
2072010
Noiseless database privacy
R Bhaskar, A Bhowmick, V Goyal, S Laxman, A Thakurta
International Conference on the Theory and Application of Cryptology and …, 2011
552011
Techniques for representing keywords in an encrypted search index to prevent histogram-based attacks
SV Lokam, A Manchepalli, B Ashok, SP Karanth, R Bhaskar
US Patent 8,819,451, 2014
472014
Improved bounds on security reductions for discrete log based signatures
S Garg, R Bhaskar, SV Lokam
Annual International Cryptology Conference, 93-107, 2008
432008
An efficient group key agreement protocol for ad hoc networks
D Augot, R Bhaskar, V Issarny, D Sacchetti
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
352005
Transparent virtual currency using verifiable tokens
S Guha, R Bhaskar, S Laxman, P Naldurg
US Patent App. 13/159,224, 2012
302012
Efficient Galois field arithmetic on SIMD architectures
R Bhaskar, PK Dubey, V Kumar, A Rudra
Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and …, 2003
292003
Aggregate designated verifier signatures and application to secure routing
R Bhaskar, J Herranz, F Laguillaumie
International Journal of Security and Networks 2 (3/4), 192-201, 2007
282007
Efficient authentication for reactive routing protocols
R Bhaskar, J Herranz, F Laguillaumie
20th International Conference on Advanced Information Networking and …, 2006
272006
A three round authenticated group key agreement protocol for ad hoc networks
D Augot, R Bhaskar, V Issarny, D Sacchetti
Pervasive and Mobile Computing 3 (1), 36-52, 2007
242007
Group key agreement in ad hoc networks
R Bhaskar
142003
Non observability in the random oracle model
P Ananth, R Bhaskar
International Conference on Provable Security, 86-103, 2013
122013
Agdh (asymmetric group diffie hellman) an efficient and dynamic group key agreement protocol for ad hoc networks
R Bhaskar, D Augot, C Adjih, P Mühlethaler, S Boudjit
New Technologies, Mobility and Security, 633-633, 2007
102007
An efficient group key agreement protocol for ad hoc networks
R Bhaskar, D Augot, V Issarny, D Sacchetti
IEEE Workshop on Trust, Security and Privacy in Ubiquitous Computing …, 2005
72005
Analysis of Two Token-Based Authentication Schemes for Mobile Banking
S Panjwani, P Naldurg, R Bhaskar
Microsoft Research Technical Report, 2010
52010
Verito: A Practical System for Transparency and Accountability in Virtual Economies.
R Bhaskar, S Guha, S Laxman, P Naldurg
NDSS, 2013
42013
Cryptographic Protocoles for Mobile Ad hoc Networks
R Bhaskar
Ecole Polytechnique X, 2006
42006
Vulnerabilities in anonymous credential systems
R Bhaskar, K Chandrasekaran, SV Lokam, PL Montgomery, ...
Electronic Notes in Theoretical Computer Science 197 (2), 141-148, 2008
32008
Efficient and Dynamic Group Key Agreement in Ad hoc Networks
R Bhaskar, P Mühlethaler, D Augot, C Adjih, S Boudjit, A Laouiti
arXiv preprint cs/0611027, 2006
32006
Authentication method and device
A Sinha, A Sinha, A Varghese, P Naldurg, R Bhaskar, S Panjwani
US Patent 9,277,403, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20