default search action
B. R. Purushothama
Person information
- affiliation: National Institute of Technology Goa, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Payal Sharma, B. R. Purushothama:
EPREKM: ElGamal proxy re-encryption-based key management scheme with constant rekeying cost and linear public bulletin size. Concurr. Comput. Pract. Exp. 36(13) (2024) - [j25]Payal Sharma, B. R. Purushothama:
User driven general framework to cap the joins in secure group communication. Int. J. Inf. Comput. Secur. 23(2): 190-199 (2024) - [j24]Payal Sharma, B. R. Purushothama:
A lightweight group key management scheme with constant rekeying cost and public bulletin size. Inf. Secur. J. A Glob. Perspect. 33(2): 97-120 (2024) - [j23]Payal Sharma, B. R. Purushothama:
Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model. Wirel. Pers. Commun. 134(3): 1299-1321 (2024) - [j22]Pooja Pradeep Dalvi, Damodar Reddy Edla, B. R. Purushothama:
DenseNet-121 Model for Diagnosis of COVID-19 Using Nearest Neighbour Interpolation and Adam Optimizer. Wirel. Pers. Commun. 137(3): 1823-1841 (2024) - [c25]Gaurav Pareek, B. R. Purushothama:
A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage. ICDCIT 2024: 133-148 - 2023
- [j21]Shilpee Prasad, B. R. Purushothama:
Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server. Int. J. Internet Protoc. Technol. 16(1): 34-45 (2023) - [j20]Payal Sharma, B. R. Purushothama:
Generalization of multicast encryption for Internet of Things deployment. J. Inf. Secur. Appl. 77: 103571 (2023) - [j19]Pooja Pradeep Dalvi, Damodar Reddy Edla, B. R. Purushothama:
Diagnosis of Coronavirus Disease From Chest X-Ray Images Using DenseNet-169 Architecture. SN Comput. Sci. 4(3): 214 (2023) - 2022
- [j18]Payal Sharma, B. R. Purushothama:
BP-MGKM: An efficient multi-group key management scheme based on bivariate polynomial. Comput. Networks 216: 109244 (2022) - [j17]Shravani Mahesh Patil, B. R. Purushothama:
QC-PRE: quorum controlled proxy re-encryption scheme for access control enforcement delegation of outsourced data. Int. J. Inf. Comput. Secur. 18(1/2): 165-192 (2022) - 2021
- [j16]Shravani Mahesh Patil, B. R. Purushothama:
Pixel co-ordinate-based secret image sharing scheme with constant size shadow images. Comput. Electr. Eng. 89: 106937 (2021) - [j15]Gaurav Pareek, B. R. Purushothama:
Blockchain-based decentralised access control scheme for dynamic hierarchies. Int. J. Inf. Comput. Secur. 16(3/4): 324-354 (2021) - [j14]Shilpee Prasad, B. R. Purushothama:
CCA secure and efficient proxy re-encryption scheme without bilinear pairing. J. Inf. Secur. Appl. 58: 102703 (2021) - [j13]Gaurav Pareek, B. R. Purushothama:
Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets. J. Inf. Secur. Appl. 58: 102799 (2021) - [j12]Gaurav Pareek, B. R. Purushothama:
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage. J. Inf. Secur. Appl. 63: 103009 (2021) - [j11]Gaurav Pareek, B. R. Purushothama:
TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications. J. Ambient Intell. Humaniz. Comput. 12(2): 1943-1965 (2021) - [j10]Payal Sharma, B. R. Purushothama:
Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game. SN Comput. Sci. 2(4): 261 (2021) - 2020
- [j9]Shravani Mahesh Patil, B. R. Purushothama:
DR-PRE: dual receiver proxy re-encryption scheme. Inf. Secur. J. A Glob. Perspect. 29(2): 62-72 (2020) - [j8]Shravani Mahesh Patil, B. R. Purushothama:
Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks. J. Inf. Secur. Appl. 50 (2020) - [j7]Gaurav Pareek, B. R. Purushothama:
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance. J. Inf. Secur. Appl. 54: 102543 (2020) - [e1]B. R. Purushothama, Veena Thenkanidiyoor, Rajendra Prasath, Vanga Odelu:
Mining Intelligence and Knowledge Exploration - 7th International Conference, MIKE 2019, Goa, India, December 19-22, 2019, Proceedings. Lecture Notes in Computer Science 11987, Springer 2020, ISBN 978-3-030-66186-1 [contents]
2010 – 2019
- 2019
- [c24]Shravani Mahesh Patil, B. R. Purushothama:
RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication. ICDCIT 2019: 349-363 - [c23]Gaurav Pareek, B. R. Purushothama:
Flexible cryptographic access control through proxy re-encryption between groups. ICDCN 2019: 507 - 2018
- [c22]Gaurav Pareek, B. R. Purushothama:
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud. ICISS 2018: 251-271 - [c21]Gaurav Pareek, B. R. Purushothama:
Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost. SIN 2018: 10:1-10:7 - [c20]Sarvesh V. Sawant, Gaurav Pareek, B. R. Purushothama:
Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis. SSCC 2018: 403-418 - 2017
- [j6]B. R. Purushothama, B. B. Amberker:
Access control mechanisms for outsourced data in public cloud using polynomial interpolation and multilinear map. Int. J. Cloud Comput. 6(1): 1-31 (2017) - [c19]B. R. Purushothama, Arun Prakash Verma:
Security analysis of group key management schemes of wireless sensor network under active outsider adversary model. ICACCI 2017: 988-994 - [c18]Ashwini Chaudhari, Gaurav Pareek, B. R. Purushothama:
Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model. ICACCI 2017: 1576-1581 - [c17]Gaurav Pareek, B. R. Purushothama:
On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes. SECRYPT 2017: 519-524 - [c16]Gaurav Pareek, B. R. Purushothama:
Proxy visible re-encryption scheme with application to e-mail forwarding. SIN 2017: 212-217 - [c15]Sarvesh V. Sawant, Gaurav Pareek, B. R. Purushothama:
A Ringer-Based Throttling Approach to Mitigate DDoS Attacks. SSCC 2017: 95-108 - [c14]B. R. Purushothama, Arun Prakash Verma, Abhilash Kumar:
Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model. SSCC 2017: 215-225 - 2016
- [j5]Nishat Koti, B. R. Purushothama:
Group-oriented encryption for dynamic groups with constant rekeying cost. Secur. Commun. Networks 9(17): 4120-4137 (2016) - [c13]Chandrasekhar Kuruba, Kethzi Gilbert, Prabhav Sidhaye, Gaurav Pareek, Byrapura Rangappa Purushothama:
Outsource-Secured Calculation of Closest Pair of Points. SSCC 2016: 377-389 - 2015
- [j4]B. R. Purushothama, B. B. Amberker:
Provably secure public key cryptosystem with limited number of encryptions for authorised sharing of outsourced data. Int. J. Cloud Comput. 4(4): 317-334 (2015) - [c12]B. R. Purushothama, Nishat Koti:
Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model. ICACCI 2015: 1825-1829 - [c11]Ronak Vyas, Alok Singh, Jolly Singh, Gunjan Soni, B. R. Purushothama:
Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing. SSCC 2015: 66-77 - [c10]Byrapura Rangappa Purushothama, B. B. Amberker:
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme. SSCC 2015: 122-133 - [c9]Nishat Koti, Esha Keni, Kritika, B. R. Purushothama:
Non-tree Based Group Key Management Scheme With Constant Rekeying and Storage Cost. WCI 2015: 564-572 - [i2]B. R. Purushothama, Nishat Koti:
On the Security of an Efficient Group Key Agreement Scheme for MANETs. IACR Cryptol. ePrint Arch. 2015: 177 (2015) - 2013
- [j3]B. R. Purushothama, B. Shrinath, B. B. Amberker:
Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud. Int. J. Inf. Commun. Technol. 5(2): 167-186 (2013) - [j2]B. R. Purushothama, B. B. Amberker:
Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation. Int. J. Trust. Manag. Comput. Commun. 1(2): 175-198 (2013) - [j1]B. R. Purushothama, B. B. Amberker:
Secure group and multi-layer group communication schemes based on polynomial interpolation. Secur. Commun. Networks 6(6): 735-756 (2013) - [c8]B. R. Purushothama, B. B. Amberker:
Secure group key management scheme based on dual receiver cryptosystem. AsiaPKC@AsiaCCS 2013: 45-50 - [c7]B. R. Purushothama, B. B. Amberker:
Provable data possession scheme with constant proof size for outsourced data in public cloud. ICACCI 2013: 1662-1667 - [c6]B. R. Purushothama, B. B. Amberker:
Efficient Hierarchical Key Management Scheme Based on Polynomial Construction. SSCC 2013: 191-202 - [i1]B. R. Purushothama, B. B. Amberker:
On the Security of Group-based Proxy Re-encryption Scheme. IACR Cryptol. ePrint Arch. 2013: 456 (2013) - 2012
- [c5]B. R. Purushothama, Bharat Amberker:
Access control mechanisms for outsourced data in cloud. COMSNETS 2012: 1-2 - [c4]B. R. Purushothama, Bharat Amberker:
Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation. SNDS 2012: 11-22 - [c3]B. R. Purushothama, Kusuma Shirisha, Bharat Amberker:
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree. SNDS 2012: 135-146 - 2011
- [c2]B. R. Purushothama, Bharat Amberker:
Group key management scheme for simultaneous multiple groups with overlapped membership. COMSNETS 2011: 1-10
2000 – 2009
- 2009
- [c1]B. R. Purushothama, Alwyn R. Pais:
Design and Implementation of Secure Internet Based Voting System with User Anonymity Using Identity Based Encryption System. IEEE SCC 2009: 474-481
Coauthor Index
aka: Bharat Amberker
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint