Arnab Roy
Arnab Roy
Research Scientist Manager, Novi Research | Facebook
Verified email at cs.stanford.edu
Title
Cited by
Cited by
Year
Protocol composition logic (PCL)
A Datta, A Derek, JC Mitchell, A Roy
Electronic Notes in Theoretical Computer Science 172, 311-358, 2007
2892007
Shorter quasi-adaptive NIZK proofs for linear subspaces
CS Jutla, A Roy
Journal of Cryptology 30 (4), 1116-1156, 2017
1702017
NIST Big Data Public Working Group Definitions and Taxonomies Subgroup In: Framework: Definitions
NBD Interoperability
NIST Special Publication, 1500-1, 2015
100*2015
Function-hiding inner product encryption is practical
S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu
International Conference on Security and Cryptography for Networks, 544-562, 2018
822018
Universally Composable Security Analysis of OAuth v2. 0.
S Chari, CS Jutla, A Roy
IACR Cryptol. ePrint Arch. 2011, 526, 2011
792011
Secrecy analysis in protocol composition logic
A Roy, A Datta, A Derek, JC Mitchell, JP Seifert
Annual Asian Computing Science Conference, 197-213, 2006
67*2006
Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces
CS Jutla, A Roy
Annual Cryptology Conference, 295-312, 2014
632014
Top ten big data security and privacy challenges
AC Mora, Y Chen, A Fuchs, A Lane, R Lu, P Manadhata
Cloud Security Alliance 140, 2012
44*2012
Formal proofs of cryptographic security of diffie-hellman-based protocols
A Roy, A Datta, JC Mitchell
International Symposium on Trustworthy Global Computing, 312-329, 2007
332007
Big data taxonomy
P Murthy, A Bharadwaj, PA Subrahmanyam, A Roy, S Rajan
Big Data Working Group, Cloud Security Alliance, 9-29, 2014
31*2014
Dual-system simulation-soundness with applications to UC-PAKE and more
CS Jutla, A Roy
International Conference on the Theory and Application of Cryptology and …, 2015
282015
Inductive proofs of computational secrecy
A Roy, A Datta, A Derek, J Mitchell
Computer Security–ESORICS 2007, 219-234, 2007
272007
NIST big data interoperability framework: Volume 6, reference architecture
WL Chang, D Boyd, O Levin
262019
Big data: Challenges, practices and technologies: NIST big data public working group workshop at IEEE big data 2014
NW Grady, M Underwood, A Roy, WL Chang
2014 IEEE International Conference on Big Data (Big Data), 11-15, 2014
252014
Relatively-sound NIZKs and password-based key-exchange
C Jutla, A Roy
International Workshop on Public Key Cryptography, 485-503, 2012
252012
Policy refinement of network services for MANETs
H Zhao, J Lobo, A Roy, SM Bellovin
12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011
252011
Improved structure preserving signatures under standard bilinear assumptions
CS Jutla, A Roy
IACR International Workshop on Public Key Cryptography, 183-209, 2017
232017
Improved (almost) tightly-secure simulation-sound QA-NIZK with applications
M Abe, CS Jutla, M Ohkubo, A Roy
International Conference on the Theory and Application of Cryptology and …, 2018
202018
Operational semantics for DKAL: Application and analysis
Y Gurevich, A Roy
International Conference on Trust, Privacy and Security in Digital Business …, 2009
202009
Analysis of EAP-GPSK authentication protocol
JC Mitchell, A Roy, P Rowe, A Scedrov
International Conference on Applied Cryptography and Network Security, 309-327, 2008
182008
The system can't perform the operation now. Try again later.
Articles 1–20