Name
Papers
Collaborators
SHARMILA DEVA SELVI
60
46
Citations 
PageRank 
Referers 
138
23.41
272
Referees 
References 
485
557
Search Limit
100485
Title
Citations
PageRank
Year
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing.00.342021
Non-transferability in Proxy Re-Encryption Revisited.00.342020
Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts.00.342020
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.00.342019
Sharing Of Encrypted Files In Blockchain Made Simpler00.342019
A Closer Look at Anonymous Proxy Re-Encryption Schemes.00.342019
Splitting and Aggregating Signatures in Cryptocurrency Protocols00.342019
Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts.00.342019
A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.00.342018
An Efficient Non-transferable Proxy Re-encryption Scheme.00.342017
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing.00.342017
Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives.00.342016
Practical IBE Secure under CBDH - Encrypting Without Pairing.00.342015
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks.00.342015
A Revocable Online-Offline Certificateless Signature Scheme without Pairing.00.342013
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round00.342013
Efficient Certificateless Online/Offline Signature with tight security10.372013
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network.20.382012
ID based signcryption scheme in standard model60.422012
Group key establishment (GKE): Two/three party key exchange to GKE00.342012
Efficient Certificateless Online/Offline Signature.00.342012
On the Security of Attribute Based Signature Schemes.00.342012
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction.10.352012
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks.00.342012
Compact Stateful Encryption Schemes with Ciphertext Verifiability.20.392012
Deterministic identity based signature scheme and its application for aggregate signatures30.392012
Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model.00.342012
CCA2 Secure Certificateless Encryption Schemes Based on RSA.00.342011
Identity-based deterministic signature scheme without forking-lemma80.482011
Compact CCA-Secure Encryption with Ciphertext Verifiability.00.342011
Identity based online/offline encryption and signcryption schemes revisited50.452011
On the Security of ID Based Signcryption Schemes.40.412011
Identity Based Self Delegated Signature - Self Proxy Signatures00.342010
A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA.20.372010
Identity Based Online/Offline Signcryption Scheme.60.472010
Identity based partial aggregate signature scheme without pairing50.452010
An Identity based Ring Signcryption Scheme with Public Verifiability.00.342010
On the Security of Identity Based Threshold Unsigncryption Schemes20.372010
Security Weaknesses in Two Certificateless Signcryption Schemes.10.352010
Identity Based Online/Offline Encryption Scheme.00.342010
Identity based public verifiable signcryption scheme100.512010
Certificateless KEM and hybrid signcryption schemes revisited60.512010
Identity Based Aggregate Signcryption Schemes100.572009
Scalable Compilers for Group Key Establishment : Two/Three Party to Group.20.382009
Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing60.462009
Breaking and Building of Group Inside Signature.00.342009
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme30.402009
On the Security of Identity Based Ring Signcryption Schemes50.462009
A note on the Certificateless Multi-receiver Signcryption Scheme.30.402009
Security Analysis of Aggregate signature and Batch verification signature schemes70.502009
  • 1
  • 2