Manik Lal Das
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [c38]Vishal Maral, Nachiket Trivedi, Manik Lal Das:
Auditing Access to Private Data on Android Platform. ICDCIT 2018: 105-111 - 2017
- [j22]Sarita Agrawal, Manik Lal Das:
Mutual healing enabled group-key distribution protocol in Wireless Sensor Networks. Computer Communications 112: 131-140 (2017) - [c37]Ritu Sharma, Manik Lal Das:
On the verification of conjunctive keyword search results using authenticated crawlers. COMSNETS 2017: 71-78 - [c36]Arjun Londhey, Manik Lal Das:
Efficient Image Authentication Scheme Using Genetic Algorithms. ICDCIT 2017: 172-180 - [c35]
- [c34]Payal Chaudhari, Manik Lal Das, Dipankar Dasgupta:
Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control. ICISS 2017: 88-103 - [c33]Nachiket Trivedi, Manik Lal Das:
MalDetec: A Non-root Approach for Dynamic Malware Detection in Android. ICISS 2017: 231-240 - [c32]Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade:
Verifiable Private Polynomial Evaluation. ProvSec 2017: 487-506 - [i19]Rahul Saranjame, Manik Lal Das:
Image Authentication using Visual Cryptography. CoRR abs/1711.09032 (2017) - [i18]Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade:
Verifiable Private Polynomial Evaluation. IACR Cryptology ePrint Archive 2017: 756 (2017) - 2016
- [c31]Sarita Agrawal, Manik Lal Das:
Node revocation and key update protocol in wireless sensor networks. ANTS 2016: 1-6 - [c30]Sarita Agrawal, Jay Patel, Manik Lal Das:
Pairing based mutual healing in wireless sensor networks. COMSNETS 2016: 1-8 - [c29]Hardik Gajera, Shruti Naik, Manik Lal Das:
On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems". ICISS 2016: 324-335 - [i17]Payal Chaudhari, Manik Lal Das:
Cryptanalysis of Searchable Anonymous Attribute Based Encryption. IACR Cryptology ePrint Archive 2016: 347 (2016) - 2015
- [j21]Manik Lal Das:
Key-escrow free multi-signature scheme using bilinear pairings. Groups Complexity Cryptology 7(1): 47-57 (2015) - [c28]
- [c27]Punit Mehta, Jigar Sharda, Manik Lal Das:
SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data. ICISS 2015: 192-206 - [c26]Payal Chaudhari, Manik Lal Das, Anish Mathuria:
On Anonymous Attribute Based Encryption. ICISS 2015: 378-392 - [c25]Sarita Agrawal, Manik Lal Das, Anish Mathuria, Sanjay Srivastava:
Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network. ICISS 2015: 419-440 - [c24]Naveen Kumar, Anish Mathuria, Manik Lal Das:
Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud. SSCC 2015: 36-44 - [c23]Naveen Kumar, Anish Mathuria, Manik Lal Das:
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System. TrustCom/BigDataSE/ISPA (1) 2015: 1249-1254 - [i16]Sarita Agrawal, Jay Patel, Manik Lal Das:
Pairing Based Mutual Healing in Wireless Sensor Networks. IACR Cryptology ePrint Archive 2015: 538 (2015) - [i15]Payal Chaudhari, Manik Lal Das:
Privacy-preserving Attribute Based Searchable Encryption. IACR Cryptology ePrint Archive 2015: 899 (2015) - 2014
- [j20]Rachit Mittal, Manik Lal Das:
Secure Node Localization in Mobile Sensor Networks. IJWNBT 3(1): 18-33 (2014) - [j19]Jaydeep Solanki, Aenik Shah, Manik Lal Das:
Secure Patrol: Patrolling Against Buffer Overflow Exploits. Information Security Journal: A Global Perspective 23(3): 107-117 (2014) - [c22]Raghuvir Songhela, Manik Lal Das:
Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. SPACE 2014: 171-182 - [i14]Payal Chaudhari, Manik Lal Das, Anish Mathuria:
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13. IACR Cryptology ePrint Archive 2014: 1028 (2014) - 2013
- [c21]Naveen Kumar, Anish Mathuria, Manik Lal Das, Kanta Matsuura:
Improving security and efficiency of time-bound access to outsourced data. COMPUTE 2013: 9:1-9:8 - [c20]Naveen Kumar, Anish Mathuria, Manik Lal Das:
Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper). ICISS 2013: 191-198 - [c19]Manik Lal Das:
Strong Security and Privacy of RFID System for Internet of Things Infrastructure. SPACE 2013: 56-69 - [i13]Harsh N. Thakker, Mayank Saha, Manik Lal Das:
Reputation Algebra for Cloud-based Anonymous Data Storage Systems. CoRR abs/1304.4002 (2013) - [i12]Raghuvir Songhela, Manik Lal Das:
Wide-weak Privacy Preserving RFID Mutual Authentication Protocol. IACR Cryptology ePrint Archive 2013: 787 (2013) - 2012
- [j18]Siva Charan Muraharirao, Manik Lal Das:
Digital Image Protection using Keyed Hash Function. IJCVIP 2(2): 36-47 (2012) - [j17]Chandrapal Chahar, Vishal Singh Chauhan, Manik Lal Das:
Code Analysis for Software and System Security Using Open Source Tools. Information Security Journal: A Global Perspective 21(6): 346-352 (2012) - [c18]C. Anudeep, Manik Lal Das:
An Improved Scheme for False Data Filtering in Wireless Sensor Networks. ICDCIT 2012: 62-70 - [c17]Anil Mundra, Anish Mathuria, Manik Lal Das:
Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation. ICDCIT 2012: 166-176 - [c16]
- [c15]Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier López:
A Novel Key Update Protocol in Mobile Sensor Networks. ICISS 2012: 194-207 - [c14]Renu Aggarwal, Manik Lal Das:
RFID security in the context of "internet of things". SECURIT 2012: 51-56 - 2011
- [j16]Manik Lal Das:
A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel. Cryptologia 35(1): 58-72 (2011)
2000 – 2009
- 2009
- [j15]Thulasi Goriparthi, Manik Lal Das, Ashutosh Saxena:
An improved bilinear pairing based remote user authentication scheme. Computer Standards & Interfaces 31(1): 181-185 (2009) - [j14]Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:
Algorithms and Approaches of Proxy Signature: A Survey. I. J. Network Security 9(3): 264-284 (2009) - [j13]Praneetha R. Bayyapu, Manik Lal Das:
An Improved and Efficient Micro-payment Scheme. JTAER 4(1): 91-100 (2009) - [j12]Manik Lal Das:
Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Communications 8(3): 1086-1090 (2009) - [i11]Animesh Agarwal, Vaibhav Shrimali, Manik Lal Das:
GSM Security Using Identity-based Cryptography. CoRR abs/0911.0727 (2009) - 2008
- [j11]Vidhani Kumar, Manik Lal Das:
Securing Wireless Sensor Networks with Public Key Techniques. Ad Hoc & Sensor Wireless Networks 5(3-4): 189-201 (2008) - [j10]Manik Lal Das, Aakash Joshi:
Dynamic Program Update in Wireless Sensor Networks Using Orthogonality Principle. IEEE Communications Letters 12(6): 471-473 (2008) - [j9]Manik Lal Das:
Comments on "Improved Efficient Remote User Authentication Schemes". I. J. Network Security 6(3): 282-284 (2008) - [j8]V. Lakshmi Narasimhan, Manik Lal Das:
Data and information security (DIS) for BS and MS programs: a proposal. SIGCSE Bulletin 40(4): 95-99 (2008) - [c13]
- [c12]Manik Lal Das, V. Lakshmi Narasimhan:
A Simple and Secure Authentication and Key Establishment Protocol. ICETET 2008: 844-849 - [c11]
- [c10]Manik Lal Das:
Efficient user authentication and secure data transmission in wireless sensor networks. ICON 2008: 1-6 - [c9]Manik Lal Das, V. Lakshmi Narasimhan:
Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. ITNG 2008: 545-550 - [c8]Manik Lal Das, V. Lakshmi Narasimhan:
EARS: Efficient Entity Authentication in Remote Systems. ITNG 2008: 603-608 - [i10]Manik Lal Das:
A Flexible and Secure Remote Systems Authentication Scheme Using Smart Cards. CoRR abs/0801.0575 (2008) - [i9]Manik Lal Das:
On the Security of "an efficient and complete remote user authentication scheme". CoRR abs/0802.2112 (2008) - [i8]
- 2007
- [j7]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Threshold key issuing in identity-based cryptosystems. Computer Standards & Interfaces 29(2): 260-264 (2007) - [j6]Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings. I. J. Network Security 4(3): 312-317 (2007) - [i7]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
A Dynamic ID-based Remote User Authentication Scheme. CoRR abs/0712.2235 (2007) - [i6]Manik Lal Das:
Comments on "Improved Efficient Remote User Authentication Schemes". CoRR abs/0712.3037 (2007) - [i5]Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings. CoRR abs/0712.3084 (2007) - 2006
- [j5]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:
A novel remote user authentication scheme using bilinear pairings. Computers & Security 25(3): 184-189 (2006) - [j4]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Identity Based Multisignatures. Informatica, Lith. Acad. Sci. 17(2): 177-186 (2006) - [i4]Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:
Algorithms and Approaches of Proxy Signature: A Survey. CoRR abs/cs/0612098 (2006) - [i3]Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena:
Cryptanalysis of recently proposed Remote User Authentication Schemes. IACR Cryptology ePrint Archive 2006: 28 (2006) - 2005
- [j3]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:
Hierarchical key management scheme using polynomial interpolation. Operating Systems Review 39(1): 40-47 (2005) - [c7]Manik Lal Das, Ashutosh Saxena:
SPAM: Secure Protocol for Authentication in Mobile-Communications. ICMB 2005: 23-27 - [c6]Ashutosh Saxena, Manik Lal Das, Anurag Gupta:
MMPS: A Versatile Mobile-to-Mobile Payment System. ICMB 2005: 400-405 - [c5]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. ITCC (1) 2005: 674-678 - [c4]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
Cryptanalysis and Improvement of a Multisignature Scheme. IWDC 2005: 398-403 - [c3]M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena:
An Effective Certificateless Signature Scheme Based on Bilinear Pairings. WOSIS 2005: 31-39 - [c2]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
ID-based Serial Multisignature Scheme using Bilinear Pairings. WOSIS 2005: 40-47 - [i2]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems. CoRR abs/cs/0506015 (2005) - 2004
- [j2]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
An Efficient Proxy Signature Scheme with Revocation. Informatica, Lith. Acad. Sci. 15(4): 455-464 (2004) - [j1]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
A dynamic ID-based remote user authentication scheme. IEEE Trans. Consumer Electronics 50(2): 629-631 (2004) - [c1]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
A Novel Remote User Authentication Scheme Through Dynamic Login Identity. IWDC 2004: 532 - 2003
- [i1]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
Security Analysis of Lal and Awasthi's Proxy Signature Schemes. IACR Cryptology ePrint Archive 2003: 263 (2003)
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-01-05 22:12 CET by the dblp team