Name
Affiliation
Papers
SREE VIVEK
Computer Science Lab|Department of Computer Science and Engineering|Indian Institute of Technology Madras
52
Collaborators
Citations 
PageRank 
40
140
20.72
Referers 
Referees 
References 
282
542
593
Search Limit
100542
Title
Citations
PageRank
Year
Delegated Anonymous Credentials With Revocation Capability for IoT Service Chains ( DANCIS )00.342022
Dynamic Verifiable Encrypted Keyword Search - Using Bitmap Index.00.342018
Secure Cloud Storage and File Sharing00.342017
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC10.352017
Forward Secure On-device Encryption Scheme Withstanding Cold Boot Attack10.352015
Practical IBE Secure under CBDH - Encrypting Without Pairing.00.342015
Controlled Proxy Re-signing - Conditional Proxy Re-Signatures.00.342015
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks.00.342015
A Revocable Online-Offline Certificateless Signature Scheme without Pairing.00.342013
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round00.342013
Efficient Certificateless Online/Offline Signature with tight security10.372013
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network.20.382012
ID based signcryption scheme in standard model60.422012
Group key establishment (GKE): Two/three party key exchange to GKE00.342012
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction.10.352012
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks.00.342012
Compact Stateful Encryption Schemes with Ciphertext Verifiability.20.392012
Deterministic identity based signature scheme and its application for aggregate signatures30.392012
Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model.00.342012
CCA2 Secure Certificateless Encryption Schemes Based on RSA.00.342011
Identity-based deterministic signature scheme without forking-lemma80.482011
Compact CCA-Secure Encryption with Ciphertext Verifiability.00.342011
Identity based online/offline encryption and signcryption schemes revisited50.452011
On the Security of ID Based Signcryption Schemes.40.412011
Identity Based Self Delegated Signature - Self Proxy Signatures00.342010
A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA.20.372010
Identity Based Online/Offline Signcryption Scheme.60.472010
Identity based partial aggregate signature scheme without pairing50.452010
An Identity based Ring Signcryption Scheme with Public Verifiability.00.342010
On the Security of Identity Based Threshold Unsigncryption Schemes20.372010
Security Weaknesses in Two Certificateless Signcryption Schemes.10.352010
Identity Based Online/Offline Encryption Scheme.00.342010
Identity based public verifiable signcryption scheme100.512010
Certificateless KEM and hybrid signcryption schemes revisited60.512010
Identity Based Aggregate Signcryption Schemes100.572009
Scalable Compilers for Group Key Establishment : Two/Three Party to Group.20.382009
Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing60.462009
Breaking and Building of Group Inside Signature.00.342009
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme30.402009
On the Security of Identity Based Ring Signcryption Schemes50.462009
A note on the Certificateless Multi-receiver Signcryption Scheme.30.402009
Security Analysis of Aggregate signature and Batch verification signature schemes70.502009
Breaking and building of threshold signcryption schemes20.392009
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers140.682009
On the Security of Two Ring Signcryption Schemes.20.402009
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme30.442008
Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.40.542008
cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards.00.342008
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks20.412008
Efficient and Provably Secure Certificateless Multi-receiver Signcryption80.482008
  • 1
  • 2