Follow
Anish Mathuria
Anish Mathuria
Professor, DA-IICT
Verified email at daiict.ac.in - Homepage
Title
Cited by
Cited by
Year
Protocols for authentication and key establishment
C Boyd, A Mathuria, D Stebila
Springer, 2003
9762003
Key establishment protocols for secure mobile communications: A selective survey
C Boyd, A Mathuria
Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998
1151998
Efficient secure aggregation in sensor networks
P Jadia, A Mathuria
High Performance Computing-HiPC 2004: 11th International Conference …, 2005
702005
On the automation of GNY logic
AM Mathuria, R Safavi-Naini, PR Nickolas
Australian Computer Science Communications 17, 370-379, 1995
361995
Protocols for key establishment and authentication
CA Boyd, A Mathuria
Springer-Verlag, 2003
332003
Key establishment protocols for secure mobile communications: a critical survey
C Boyd, A Mathuria
Computer Communications 23 (5-6), 575-587, 2000
312000
A novel key update protocol in mobile sensor networks
S Agrawal, R Roman, ML Das, A Mathuria, J Lopez
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
242012
Some remarks on the logic of Gong, Needham and Yahalom
A Mathuria, R Safani-Naini, P Nickolas
University of Wollongong. Department of Computing Science, 1994
211994
An extended logic for analyzing timed-release public-key protocols
M Kudo, A Mathuria
Information and Communication Security: Second International Conference …, 1999
191999
On anonymous attribute based encryption
P Chaudhari, ML Das, A Mathuria
Information Systems Security: 11th International Conference, ICISS 2015 …, 2015
142015
Systematic design of key establishment protocols based on one-way functions
C Boyd, A Mathuria
IEE Proceedings-Computers and Digital Techniques 144 (2), 93-99, 1997
141997
Program integrity verification for detecting node capture attack in wireless sensor network
S Agrawal, ML Das, A Mathuria, S Srivastava
Information Systems Security: 11th International Conference, ICISS 2015 …, 2015
102015
Some new multi-protocol attacks
A Mathuria, AR Singh, PV Sharavan, R Kirtankar
15th International Conference on Advanced Computing and Communications …, 2007
102007
New attacks on ISO key establishment protocols
A Mathuria, G Sriram
Cryptology ePrint Archive, 2008
92008
An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys
C Boyd, KKR Choo, A Mathuria
Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006
92006
A Tutorial Introduction to Authentication and Key Establishment
C Boyd, A Mathuria, C Boyd, A Mathuria
Protocols for authentication and key establishment, 1-32, 2003
82003
Automatic generation of compact alphanumeric shellcodes for x86
A Basu, A Mathuria, N Chowdary
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
72014
An efficient key assignment scheme for access control in a hierarchy
PK Vadnala, A Mathuria
Information Systems Security: Second International Conference, ICISS 2006 …, 2006
72006
Security analysis of the louis protocol for location privacy
A Gupta, M Saini, A Mathuria
2009 First International Communication Systems and Networks and Workshops, 1-8, 2009
62009
Improved write access control and stronger freshness guarantee to outsourced data
N Kumar, A Mathuria
Proceedings of the 18th International Conference on Distributed Computing …, 2017
52017
The system can't perform the operation now. Try again later.
Articles 1–20