Naveen Kumar
Naveen Kumar
Assistant Professor
Verified email at iiitvadodara.ac.in
Title
Cited by
Cited by
Year
An efficient and provably secure time‐limited key management scheme for outsourced data
N Kumar, S Tiwari, Z Zheng, KK Mishra, AK Sangaiah
Concurrency and Computation: Practice and Experience, e4498, 2018
52018
Achieving forward secrecy and unlinkability in cloud-based personal health record system
N Kumar, A Mathuria, ML Das
2015 IEEE Trustcom/BigDataSE/ISPA 1, 1249-1254, 2015
42015
Improved write access control and stronger freshness guarantee to outsourced data
N Kumar, A Mathuria
Proceedings of the 18th International Conference on Distributed Computing …, 2017
32017
Distributed and Lazy Auditing of Outsourced Data
AK Dwivedi, N Kumar, M Pathela
International Conference on Distributed Computing and Internet Technology …, 2020
22020
Comparing the efficiency of key management hierarchies for access control in cloud
N Kumar, A Mathuria, ML Das
International Symposium on Security in Computing and Communication, 36-44, 2015
22015
Simple and efficient time-bound hierarchical key assignment scheme
N Kumar, A Mathuria, ML Das
International Conference on Information Systems Security, 191-198, 2013
22013
Improving security and efficiency of time-bound access to outsourced data
N Kumar, A Mathuria, ML Das, K Matsuura
Proceedings of the 6th ACM India Computing Convention, 1-8, 2013
22013
Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation
MLD Anil Mundra, Naveen Kumar, Anish Mathuria
CSI Journal of computing 1 (2), 73-79, 2012
2*2012
Improved software cost estimation models: A new perspective based on evolution in Dynamic Environment
A Tripathi, KK Mishra, S Tiwari, N Kumar
Journal of Intelligent & Fuzzy Systems, 1-14, 2018
12018
Security and privacy issues in outsourced personal health record
N Kumar, A Mathuria
Research Advances in Cloud Computing, 431-447, 2017
12017
On classifying indirect key assignment schemes for hierarchical access control
N Kumar, A Mathuria, ML Das
Proceedings of 10th National Workshop on Cryptology (NWCR 2010), 2-4, 2010
12010
Consensus-based data replication protocol for distributed cloud
R Maheshwari, N Kumar, M Shadi, S Tiwari
The Journal of Supercomputing, 1-21, 2021
2021
Classifying Time-Bound Hierarchical Key Assignment Schemes
VR Vadi, N Kumar, S Abidin
Advances in Computer, Communication and Computational Sciences, 111-119, 2021
2021
Cloud-based Secure Personal Health Record Management System using Mixnode and Blockchain
Rituraj, N Kumar
2020 Fourth World Conference on Smart Trends in Systems, Security and …, 2020
2020
Comprehensive evaluation of key management hierarchies for outsourced data
N Kumar, A Mathuria
Cybersecurity 2 (1), 1-17, 2019
2019
A Feasibility Study on Upgrading the Static TLC Infrastructure to Adaptive TLC
A Bisht, K Ravani, M Chaturvedi, N Kumar
2019 IEEE Intelligent Transportation Systems Conference (ITSC), 2563-2568, 2019
2019
Two Views on Hierarchical Key Assignment Schemes
A MUNDRA, A MATHURIA, N KUMAR
日本セキュリティ・マネジメント学会誌 25 (3), 40-51, 2012
2012
DST-JST Project
A Mathuria, ML Das, NK RA, PH JRF
The system can't perform the operation now. Try again later.
Articles 1–18