Jothi Rangasamy a.k.a Jothi Ramalingam
Jothi Rangasamy a.k.a Jothi Ramalingam
Bestätigte E-Mail-Adresse bei nitk.edu.in - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
D Stebila, L Kuppusamy, J Rangasamy, C Boyd, JG Nieto
Cryptographers’ Track at the RSA Conference, 284-301, 2011
552011
An integrated approach to cryptographic mitigation of denial-of-service attacks
J Rangasamy, D Stebila, C Boyd, JG Nieto
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
212011
Publicly verifiable ciphertexts
JMG Nieto, M Manulis, B Poettering, J Rangasamy, D Stebila
International Conference on Security and Cryptography for Networks, 393-410, 2012
132012
CRT-based outsourcing algorithms for modular exponentiations
L Kuppusamy, J Rangasamy
International Conference on Cryptology in India, 81-98, 2016
112016
Efficient modular exponentiation-based puzzles for denial-of-service protection
J Rangasamy, D Stebila, L Kuppusamy, C Boyd, JG Nieto
International Conference on Information Security and Cryptology, 319-331, 2011
112011
Practical client puzzles in the standard model
L Kuppusamy, J Rangasamy, D Stebila, C Boyd, JG Nieto
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
72012
Decomposed s-boxes and DPA attacks: A quantitative case study using PRINCE
R Selvam, D Shanmugam, S Annadurai, J Rangasamy
International Conference on Security, Privacy, and Applied Cryptography …, 2016
52016
Cryptographic approaches to denial-of-service resistance
C Boyd, J Gonzalez-Nieto, L Kuppusamy, H Narasimhan, CP Rangan, ...
An Investigation into the Detection and Mitigation of Denial of Service (DoS …, 2011
52011
Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
O Uzunkol, J Rangasamy, L Kuppusamy
International Conference on Information Security, 250-267, 2018
42018
Towards a provably secure dos-resilient key exchange protocol with perfect forward secrecy
L Kuppusamy, J Rangasamy, D Stebila, C Boyd, JG Nieto
International Conference on Cryptology in India, 379-398, 2011
42011
Revisiting single-server algorithms for outsourcing modular exponentiation
J Rangasamy, L Kuppusamy
International Conference on Cryptology in India, 3-20, 2018
22018
On secure outsourcing of cryptographic computations to cloud
L Kuppusamy, J Rangasamy, P Gauravaram
Proceedings of the 2nd international workshop on Security in cloud computing …, 2014
22014
Publicly verifiable ciphertexts
JG Nieto, M Manulis, B Poettering, J Rangasamy, D Stebila
Journal of computer security 21 (5), 749-778, 2013
12013
Effort-release public-key encryption from cryptographic puzzles
J Rangasamy, D Stebila, C Boyd, JM González-Nieto, L Kuppusamy
Australasian Conference on Information Security and Privacy, 194-207, 2012
12012
Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services
J Rangasamy, L Kuppusamy, G Krishnan, Velmurugan
International Journal of Information and Computer Security 9 (1-2), 114-129, 2017
2017
Refined Shacham–Waters ring signature scheme in Seo–Cheon framework
MP Laxman Das, J Rangasamy, R Kabaleeshwaran
Security and Communication Networks 9 (13), 2122-2134, 2016
2016
Improved Cryptographic Puzzle Based on Modular Exponentiation
L Kuppusamy, J Rangasamy
Mathematics and Computing, 107-121, 2015
2015
Preserving Privacy in Data Outsourcing: by Sara Foresti Springer 2011
J Rangasamy
2013
Cryptographic techniques for managing computational effort
JR Rangasamy
Queensland University of Technology, 2012
2012
This file was downloaded from: http://eprints. qut. edu. au/47824
L Kuppusamy, J Rangasamy, D Stebila, C Boyd, JG Nieto
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20