Follow
Anish Mathuria
Anish Mathuria
Professor, DA-IICT
Verified email at daiict.ac.in - Homepage
Title
Cited by
Cited by
Year
Protocols for authentication and key establishment
C Boyd, A Mathuria, D Stebila
Springer, 2003
9302003
Key establishment protocols for secure mobile communications: A selective survey
C Boyd, A Mathuria
Australasian Conference on Information Security and Privacy, 344-355, 1998
1151998
Efficient secure aggregation in sensor networks
P Jadia, A Mathuria
International Conference on High-Performance Computing, 40-49, 2004
702004
On the automation of GNY logic
AM Mathuria, R Safavi-Naini, PR Nickolas
Australian Computer Science Communications 17, 370-379, 1995
371995
Protocols for key establishment and authentication
CA Boyd, A Mathuria
Springer-Verlag, 2003
332003
Key establishment protocols for secure mobile communications: a critical survey
C Boyd, A Mathuria
Computer Communications 23 (5-6), 575-587, 2000
302000
A novel key update protocol in mobile sensor networks
S Agrawal, R Roman, ML Das, A Mathuria, J Lopez
International Conference on Information Systems Security, 194-207, 2012
252012
Some remarks on the logic of Gong, Needham and Yahalom
A Mathuria, R Safani-Naini, P Nickolas
University of Wollongong. Department of Computing Science, 1994
211994
An extended logic for analyzing timed-release public-key protocols
M Kudo, A Mathuria
International Conference on Information and Communications Security, 183-198, 1999
161999
On anonymous attribute based encryption
P Chaudhari, ML Das, A Mathuria
International Conference on Information Systems Security, 378-392, 2015
132015
Systematic design of key establishment protocols based on one-way functions
C Boyd, A Mathuria
IEE Proceedings-Computers and Digital Techniques 144 (2), 93-99, 1997
131997
Some new multi-protocol attacks
A Mathuria, AR Singh, PV Sharavan, R Kirtankar
15th International Conference on Advanced Computing and Communications …, 2007
112007
Program integrity verification for detecting node capture attack in wireless sensor network
S Agrawal, ML Das, A Mathuria, S Srivastava
International Conference on Information Systems Security, 419-440, 2015
102015
An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys
C Boyd, KKR Choo, A Mathuria
Australasian Conference on Information Security and Privacy, 371-382, 2006
102006
New attacks on ISO key establishment protocols
A Mathuria, G Sriram
Cryptology ePrint Archive, 2008
92008
Automatic generation of compact alphanumeric shellcodes for x86
A Basu, A Mathuria, N Chowdary
International Conference on Information Systems Security, 399-410, 2014
72014
An efficient key assignment scheme for access control in a hierarchy
PK Vadnala, A Mathuria
International Conference on Information Systems Security, 205-219, 2006
72006
Security analysis of the louis protocol for location privacy
A Gupta, M Saini, A Mathuria
2009 First International Communication Systems and Networks and Workshops, 1-8, 2009
62009
A Tutorial Introduction to Authentication and Key Establishment
C Boyd, A Mathuria
Protocols for authentication and key establishment, 1-32, 2003
62003
Peer2peer (p2p) micropayments: A survey and critical analysis
M Jain, S Lal, A Mathuria
DA-IICT, Gandhinagar, 2008
52008
The system can't perform the operation now. Try again later.
Articles 1–20