Follow
Anish Mathuria
Anish Mathuria
Professor, DA-IICT
Verified email at daiict.ac.in - Homepage
Title
Cited by
Year
A Connector between Scyther and SHRIMP
S Lal, A Mathuria
Dhirubhai Ambani Institute of Information and Communication Technology, 2009
2009
A novel key update protocol in mobile sensor networks
S Agrawal, R Roman, ML Das, A Mathuria, J Lopez
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
252012
A Research Study on User Concerns Regarding Online Advertising
L Agarwal, A Mathuria, S Panjwani, S Jaiswal, METPS Oak
Dhirubhai Ambani Institute of Information and Communication Technology, 2013
2013
A Tool for Visualizing Concurrent C Programs Using Graphs
H Sokhadia, A Mathuria
2016 IEEE Eighth International Conference on Technology for Education (T4E …, 2016
12016
A Tutorial Introduction to Authentication and Key Establishment
C Boyd, A Mathuria, C Boyd, A Mathuria
Protocols for authentication and key establishment, 1-32, 2003
92003
Achieving forward secrecy and unlinkability in cloud-based personal health record system
N Kumar, A Mathuria, ML Das
2015 IEEE Trustcom/BigDataSE/ISPA 1, 1249-1254, 2015
62015
Addressing weaknesses in two cryptographic protocols of Bull, Gong and Sollins
AM Mathuria
Electronics Letters 31 (18), 1543-1544, 1995
41995
Alphanumeric shellcode generator for ARM architecture
P Kumar, N Chowdary, A Mathuria
Security, Privacy, and Applied Cryptography Engineering: Third International …, 2013
32013
An efficient key assignment scheme for access control in a hierarchy
PK Vadnala, A Mathuria
International Conference on Information Systems Security, 205-219, 2006
72006
An enhanced privacy-preserving recommender system
P Verma, H Vaishnav, A Mathuria, S Dasgupta
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019
42019
An extended logic for analyzing timed-release public-key protocols
M Kudo, A Mathuria
International Conference on Information and Communications Security, 183-198, 1999
181999
An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys
C Boyd, KKR Choo, A Mathuria
Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006
102006
Analysis and Enhancement of Two Key Agreement Protocols for Wireless Networks
A Singhal, V Garg, A Mathuria
2007 2nd International Conference on Communication Systems Software and …, 2007
12007
Authentication and key transport using public key cryptography
C Boyd, A Mathuria, D Stebila, C Boyd, A Mathuria, D Stebila
Protocols for Authentication and Key Establishment, 135-164, 2020
92020
Automated detection of false attacks
A Mathuria
Dhirubhai Ambani Institute of Information and Communication Technology, 2010
2010
Automatic generation of compact alphanumeric shellcodes for x86
A Basu, A Mathuria, N Chowdary
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
92014
Automatic generation of compact printable shellcodes for x86
D Patel, A Basu, A Mathuria
14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020
62020
Automating ban logic
A Mathuria
31994
Causality, partial orders, and lower bounds on rounds for a class of authentication protocols
A Mathuria, R Safavi-Naini, P Nickolas
AUSTRALIAN COMPUTER SCIENCE COMMUNICATIONS 19, 27-36, 1997
1997
Comparing lower bounds on messages and rounds for two classes of key establishment protocols
A Mathuria
ACM SIGCOMM Computer Communication Review 28 (5), 91-98, 1998
21998
The system can't perform the operation now. Try again later.
Articles 1–20