Follow
Anish Mathuria
Anish Mathuria
Professor, DA-IICT
Verified email at daiict.ac.in - Homepage
Title
Cited by
Cited by
Year
Protocols for authentication and key establishment
C Boyd, A Mathuria, D Stebila
Springer, 2003
10322003
Key establishment protocols for secure mobile communications: A selective survey
C Boyd, A Mathuria
Australasian Conference on Information Security and Privacy, 344-355, 1998
1141998
Efficient secure aggregation in sensor networks
P Jadia, A Mathuria
International Conference on High-Performance Computing, 40-49, 2004
712004
On the automation of GNY logic
AM Mathuria, R Safavi-Naini, PR Nickolas
Australian Computer Science Communications 17, 370-379, 1995
371995
Protocols for key establishment and authentication
CA Boyd, A Mathuria
Springer-Verlag, 2003
332003
Key establishment protocols for secure mobile communications: a critical survey
C Boyd, A Mathuria
Computer Communications 23 (5-6), 575-587, 2000
322000
A novel key update protocol in mobile sensor networks
S Agrawal, R Roman, ML Das, A Mathuria, J Lopez
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
252012
Some remarks on the logic of Gong, Needham and Yahalom
A Mathuria, R Safani-Naini, P Nickolas
University of Wollongong. Department of Computing Science, 1994
201994
An extended logic for analyzing timed-release public-key protocols
M Kudo, A Mathuria
International Conference on Information and Communications Security, 183-198, 1999
181999
On anonymous attribute based encryption
P Chaudhari, ML Das, A Mathuria
Information Systems Security: 11th International Conference, ICISS 2015 …, 2015
162015
Systematic design of key establishment protocols based on one-way functions
C Boyd, A Mathuria
IEE Proceedings-Computers and Digital Techniques 144 (2), 93-99, 1997
141997
Program integrity verification for detecting node capture attack in wireless sensor network
S Agrawal, ML Das, A Mathuria, S Srivastava
Information Systems Security: 11th International Conference, ICISS 2015 …, 2015
112015
An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys
C Boyd, KKR Choo, A Mathuria
Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006
112006
Some new multi-protocol attacks
A Mathuria, AR Singh, PV Sharavan, R Kirtankar
15th International Conference on Advanced Computing and Communications …, 2007
102007
Automatic generation of compact alphanumeric shellcodes for x86
A Basu, A Mathuria, N Chowdary
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
92014
New attacks on ISO key establishment protocols
A Mathuria, G Sriram
Cryptology ePrint Archive, 2008
92008
A Tutorial Introduction to Authentication and Key Establishment
C Boyd, A Mathuria, C Boyd, A Mathuria
Protocols for authentication and key establishment, 1-32, 2003
92003
Authentication and key transport using public key cryptography
C Boyd, A Mathuria, D Stebila, C Boyd, A Mathuria, D Stebila
Protocols for Authentication and Key Establishment, 135-164, 2020
72020
An efficient key assignment scheme for access control in a hierarchy
PK Vadnala, A Mathuria
International Conference on Information Systems Security, 205-219, 2006
72006
Improved write access control and stronger freshness guarantee to outsourced data
N Kumar, A Mathuria
Proceedings of the 18th International Conference on Distributed Computing …, 2017
62017
The system can't perform the operation now. Try again later.
Articles 1–20