SecCloudSharing: Secure data sharing in public cloud using ciphertext‐policy attribute‐based proxy re‐encryption with revocation D Tiwari, GR Gangadharan International journal of communication systems 31 (5), e3494, 2018 | 25 | 2018 |
ACDAS: Authenticated controlled data access and sharing scheme for cloud storage D Tiwari, GK Chaturvedi, GR Gangadharan International Journal of Communication Systems 32 (15), e4072, 2019 | 15 | 2019 |
A novel secure cloud storage architecture combining proof of retrievability and revocation D Tiwari, GR Gangadharan 2015 International Conference on Advances in Computing, Communications and …, 2015 | 14 | 2015 |
SecAuth-SaaS: a hierarchical certificateless aggregate signature for secure collaborative SaaS authentication in cloud computing D Tiwari, GR Gangadharan Journal of Ambient Intelligence and Humanized Computing 12 (12), 10539-10563, 2021 | 9 | 2021 |
System and method for providing secure collaborative software as a service (SaaS) attestation service for authentication in cloud computing D Tiwari, GR Gangadharan US Patent 10,498,537, 2019 | 9 | 2019 |
A novel authenticated encryption scheme with convertibility S Thadvai, DN Tiwari, D Jena, M Ma Mathematical and Computer Modelling 58 (1-2), 178-185, 2013 | 7 | 2013 |
Secure delegation of services through proxy signature with revocation D Tiwari, GR Gangadharan, M Ma International Journal of Trust Management in Computing and Communications 3 …, 2016 | 3 | 2016 |
Secure sharing of data in cloud computing D Tiwari, GR Gangadharan Security in Computing and Communications: Third International Symposium …, 2015 | 3 | 2015 |
Open‐Source Cloud Software Solutions GR Gangadharan, D Tiwari, L Sanagavarapu, S Mishra, A Williams, ... Encyclopedia of Cloud Computing, 139-149, 2016 | 2 | 2016 |
RcAMA-An Recursive Composition Algebra-based Framework for Detection of Multistage Attacks GS Bopche, GN Rai, D Tiwari 2023 15th International Conference on COMmunication Systems & NETworkS …, 2023 | 1 | 2023 |
Boolean Similarity Measure for Assessing Temporal Variation in the Network Attack Surface GS Bopche, D Tiwari, GN Rai 2023 15th International Conference on COMmunication Systems & NETworkS …, 2023 | | 2023 |
Blockchain–Foundational infrastructure for Web 3.0 and cryptoassets A Dubey, D Tiwari, A Tiwari Blockchain for Industry 4.0 1, 121-142, 2022 | | 2022 |
Handbook on Application Programming Interfaces (APIs) deepnarayan tiwari et.al. https://www.idrbt.ac.in/assets/publications/Best%20Practices/2019 …, 2019 | | 2019 |
Provable secure protected designated proxy signature with revocation D Tiwari, GR Gangadharan, M Ma 2015 International Conference on Advances in Computing, Communications and …, 2015 | | 2015 |
Authenticated secure data storage and sharing in cloud computing D Tiwari Hyderabad, 0 | | |