Follow
Purushothama B R
Title
Cited by
Cited by
Year
Efficient query processing on outsourced encrypted data in cloud with privacy preservation
BR Purushothama, BB Amberker
2012 International Symposium on Cloud and Services Computing, 88-95, 2012
192012
Group‐oriented encryption for dynamic groups with constant rekeying cost
K Nishat, BR Purushothama
Security and communication networks 9 (17), 4120-4137, 2016
162016
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage
G Pareek, BR Purushothama
Journal of information security and applications 63, 103009, 2021
152021
Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks
SM Patil, BR Purushothama
Journal of Information Security and Applications 50, 102411, 2020
142020
Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
BR Purushothama, B Shrinath, BB Amberker
International Journal of Information and Communication Technology 5 (2), 167-186, 2013
142013
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance
G Pareek, BR Purushothama
Journal of Information Security and Applications 54, 102543, 2020
132020
Rsa-based collusion resistant quorum controlled proxy re-encryption scheme for distributed secure communication
SM Patil, BR Purushothama
International Conference on Distributed Computing and Internet Technology …, 2018
122018
Design and implementation of secure internet based voting system with user anonymity using identity based encryption system
BR Purushothama, AR Pais
2009 IEEE International Conference on Services Computing, 474-481, 2009
122009
Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
G Pareek, BR Purushothama
Sādhanā 43 (9), 137, 2018
102018
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes.
G Pareek, BR Purushothama
SECRYPT, 519-524, 2017
92017
Pixel co-ordinate-based secret image sharing scheme with constant size shadow images
SM Patil, BR Purushothama
Computers & Electrical Engineering 89, 106937, 2021
82021
Design of an efficient verification scheme for correctness of outsourced computations in cloud computing
R Vyas, A Singh, J Singh, G Soni, BR Purushothama
Security in Computing and Communications: Third International Symposium …, 2015
72015
Diagnosis of coronavirus disease from chest x-ray images using DenseNet-169 architecture
PP Dalvi, DR Edla, BR Purushothama
SN Computer Science 4 (3), 214, 2023
62023
Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model
A Chaudhari, G Pareek, BR Purushothama
2017 International Conference on Advances in Computing, Communications and …, 2017
62017
Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model
BR Purushothama, N Koti
2015 International Conference on Advances in Computing, Communications and …, 2015
62015
Group key management scheme for simultaneous multiple groups with overlapped membership
BR Purushothama, BB Amberker
2011 Third International Conference on Communication Systems and Networks …, 2011
62011
Cryptanalysis of a secure and efficient Diffie–Hellman based key agreement scheme
P Sharma, BR Purushothama
International Journal of Information Technology 15 (2), 981-989, 2023
52023
Proxy re-encryption scheme for access control enforcement delegation on outsourced data in public cloud
G Pareek, BR Purushothama
International Conference on Information Systems Security, 251-271, 2018
52018
Security analysis of group key management schemes of wireless sensor network under active outsider adversary model
BR Purushothama, AP Verma
2017 International Conference on Advances in Computing, Communications and …, 2017
52017
CCA secure and efficient proxy re-encryption scheme without bilinear pairing
S Prasad, BR Purushothama
Journal of Information Security and Applications 58, 102703, 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20