Anish Mathuria
Anish Mathuria
Professor, DA-IICT
Bestätigte E-Mail-Adresse bei daiict.ac.in - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Protocols for authentication and key establishment
C Boyd, A Mathuria, D Stebila
Springer, 2003
8132003
Protocols for key establishment and authentication
CA Boyd, A Mathuria
Springer-Verlag, 2003
1292003
Key establishment protocols for secure mobile communications: A selective survey
C Boyd, A Mathuria
Australasian Conference on Information Security and Privacy, 344-355, 1998
1101998
Efficient secure aggregation in sensor networks
P Jadia, A Mathuria
International Conference on High-Performance Computing, 40-49, 2004
672004
On the automation of GNY logic
AM Mathuria, R Safavi-Naini, PR Nickolas
Australian Computer Science Communications 17, 370-379, 1995
341995
Key establishment protocols for secure mobile communications: a critical survey
C Boyd, A Mathuria
Computer Communications 23 (5-6), 575-587, 2000
302000
A novel key update protocol in mobile sensor networks
S Agrawal, R Roman, ML Das, A Mathuria, J Lopez
International Conference on Information Systems Security, 194-207, 2012
262012
Some remarks on the logic of Gong, Needham and Yahalom
A Mathuria, R Safani-Naini, P Nickolas
University of Wollongong. Department of Computing Science, 1994
191994
An extended logic for analyzing timed-release public-key protocols
M Kudo, A Mathuria
International Conference on Information and Communications Security, 183-198, 1999
171999
Systematic design of key establishment protocols based on one-way functions
C Boyd, A Mathuria
IEE Proceedings-Computers and Digital Techniques 144 (2), 93-99, 1997
131997
On anonymous attribute based encryption
P Chaudhari, ML Das, A Mathuria
International Conference on Information Systems Security, 378-392, 2015
122015
Some new multi-protocol attacks
A Mathuria, AR Singh, PV Sharavan, R Kirtankar
15th International Conference on Advanced Computing and Communications …, 2007
102007
Program integrity verification for detecting node capture attack in wireless sensor network
S Agrawal, ML Das, A Mathuria, S Srivastava
International Conference on Information Systems Security, 419-440, 2015
92015
An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys
C Boyd, KKR Choo, A Mathuria
Australasian Conference on Information Security and Privacy, 371-382, 2006
92006
New attacks on ISO key establishment protocols.
A Mathuria, G Sriram
IACR Cryptol. ePrint Arch. 2008, 336, 2008
82008
An efficient key assignment scheme for access control in a hierarchy
PK Vadnala, A Mathuria
International Conference on Information Systems Security, 205-219, 2006
72006
Automatic generation of compact alphanumeric shellcodes for x86
A Basu, A Mathuria, N Chowdary
International Conference on Information Systems Security, 399-410, 2014
62014
Security analysis of the louis protocol for location privacy
A Gupta, M Saini, A Mathuria
2009 First International Communication Systems and Networks and Workshops, 1-8, 2009
62009
Information Security: 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings
C Boyd, W Mao
Springer, 2003
42003
Addressing weaknesses in two cryptographic protocols of Bull, Gong and Sollins
AM Mathuria
Electronics Letters 31 (18), 1543-1544, 1995
41995
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20