Follow
Dr. Ashutosh Saxena
Dr. Ashutosh Saxena
Prof and Dean R&D, CMR Technical Campus, Hyderabad
Verified email at cmrtc.ac.in
Title
Cited by
Cited by
Year
A dynamic ID-based remote user authentication scheme
ML Das, A Saxena, VP Gulati
IEEE transactions on Consumer Electronics 50 (2), 629-631, 2004
8042004
An efficient certificateless signature scheme
MC Gorantla, A Saxena
International Conference on Computational and Information Science, 110-116, 2005
2112005
A novel remote user authentication scheme using bilinear pairings
ML Das, A Saxena, VP Gulati, DB Phatak
Computers & Security 25 (3), 184-189, 2006
1722006
Data integrity proofs in cloud storage
RS Kumar, A Saxena
2011 Third International Conference on Communication Systems and Networks …, 2011
1682011
Content licensing and conditional access using a mobile device
A Saxena, HKB Ponnapalli
US Patent 8,590,028, 2013
982013
System and method for monitoring human interaction
A Saxena, K Surni
US Patent App. 12/197,951, 2009
892009
Identity based strong designated verifier signature scheme
Phani Kumar, Kancharla, Shailaja, Gummadidala, A Saxena
Informatica 18 (2), 239-252, 2007
802007
An improved bilinear pairing based remote user authentication scheme
T Goriparthi, ML Das, A Saxena
Computer Standards & Interfaces 31 (1), 181-185, 2009
762009
A green software development life cycle for cloud computing
NS Chauhan, A Saxena
It Professional 15 (1), 28-34, 2013
712013
Hierarchical key management scheme using polynomial interpolation
ML Das, A Saxena, VP Gulati, DB Phatak
ACM SIGOPS Operating Systems Review 39 (1), 40-47, 2005
652005
System and method for monitoring human interaction
VK Saxena, A Saxena
US Patent 9,213,821, 2015
632015
A survey on id-based cryptographic primitives
MC Gorantla, R Gangishetti, A Saxena
Cryptology ePrint Archive, 2005
582005
A cryptography based privacy preserving solution to mine cloud data
MD Singh, PR Krishna, A Saxena
Proceedings of the Third Annual ACM Bangalore Conference, 1-4, 2010
422010
Mutual authentication and key agreement for GSM
KP Kumar, G Shailaja, A Kavitha, A Saxena
2006 International Conference on Mobile Business, 25-25, 2006
412006
Cryptanalysis of recently proposed remote user authentication schemes
T Goriparthi, ML Das, A Negi, A Saxena
Cryptology ePrint Archive, 2006
412006
Proof of erasability for ensuring comprehensive data deletion in cloud computing
M Paul, A Saxena
Recent Trends in Network Security and Applications: Third International …, 2010
392010
An efficient secure key issuing protocol in ID-based cryptosystems
R Gangishetti, MC Gorantla, ML Das, A Saxena, VP Gulati
International Conference on Information Technology: Coding and Computing …, 2005
392005
Algorithms and approaches of proxy signature: A survey
ML Das, A Saxena, DB Phatak
International Journal of Network Security 9 (3), 264–284, 2009
372009
Threshold key issuing in identity-based cryptosystems
R Gangishetti, MC Gorantla, ML Das, A Saxena
Computer Standards & Interfaces 29 (2), 260-264, 2007
372007
Method and system for adaptive vulnerability scanning of an application
A Saxena, M Ponnath, VA Gujjary
US Patent 8,839,441, 2014
352014
The system can't perform the operation now. Try again later.
Articles 1–20