Name
Papers
Collaborators
ASHISH KUNDU
43
78
Citations 
PageRank 
Referers 
250
22.85
473
Referees 
References 
706
332
Search Limit
100706
Title
Citations
PageRank
Year
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks00.342022
AI-Driven Selective Protection of Multimedia Data00.342021
Similarities and Learnings from Ancient Literature on Blockchain Consensus and Integrity00.342021
StackVault: Protection from Untrusted Functions00.342020
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.00.342019
How Secure Is Your IoT Network?00.342019
Malware Containment in Cloud00.342019
Data Transparency with Blockchain and AI Ethics.00.342019
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems00.342019
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases.30.372018
Healthcare Informatics and Privacy.10.352018
A Trusted Healthcare Data Analytics Cloud Platform00.342018
Collaborative and Accountable Hardware Governance Using Blockchain00.342018
Research Directions in Blockchain Data Management and Analytics.00.342018
Principle of Need-to-Act.00.342017
Compliance-Aware Provisioning of Containers on Cloud00.342017
Energy Attacks on Mobile Devices00.342017
Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress).00.342017
Risk-Based Packet Routing For Privacy And Compliance-Preserving Sdn00.342017
Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud00.342016
Managing sensitive applications in the public cloud.10.412016
An Efficient Parallel Implementation of a Light-weight Data Privacy Method for Mobile Cloud Users.10.372016
Security of graph data: hashing schemes and definitions00.342014
Towards a Systematic Study of the Covert Channel Attacks in Smartphones.110.592014
Service Usage Metering in Hybrid Cloud Environments30.442014
Network-Level Access Control Management for the Cloud20.442013
Privacy-preserving authentication of trees and graphs120.522013
Towards Authenticated Objects.00.342013
Authentication of Data on Devices00.342012
On Hashing Graphs.00.342012
Efficient Leakage-free Authentication of Trees, Graphs and Forests.70.452012
Leakage-free redactable signatures80.452012
A New Class of Buffer Overflow Attacks10.352011
How to authenticate graphs without leaking170.662010
SN2K Attacks and Honest Services00.342009
A tree-covering problem arising in integrity of tree-structured data10.362008
A New Model for Secure Dissemination of XML Content120.632008
Structural signatures for tree data structures.00.342008
Structural signatures for tree data structures471.652008
Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors160.842008
Secure Dissemination of XML Content Using Structure-based Routing100.652006
Building applications using end to end composition of web services00.342005
A service creation environment based on end to end composition of Web services974.862005