Privacy preserving searchable encryption with fine-grained access control P Chaudhari, ML Das IEEE Transactions on Cloud Computing 9 (2), 753-762, 2019 | 63 | 2019 |
Keysea: Keyword-based search with receiver anonymity in attribute-based searchable encryption P Chaudhari, ML Das IEEE Transactions on Services Computing 15 (2), 1036-1044, 2020 | 50 | 2020 |
On anonymous attribute based encryption P Chaudhari, ML Das, A Mathuria Information Systems Security: 11th International Conference, ICISS 2015 …, 2015 | 20 | 2015 |
Privacy-preserving attribute based searchable encryption P Chaudhari, M Das Cryptology ePrint Archive, 2015 | 8 | 2015 |
Background knowledge attacks in privacy-preserving data publishing models N Desai, ML Das, P Chaudhari, N Kumar Computers & Security 122, 102874, 2022 | 7 | 2022 |
A2BSE: Anonymous attribute based searchable encryption P Chaudhari, ML Das 2017 ISEA Asia Security and Privacy (ISEASP), 1-10, 2017 | 6 | 2017 |
The Road-ahead for E-healthcare 4.0: A Review of Security Challenges R Talati, P Chaudhari 2022 1st International Conference on Informatics (ICI), 208-213, 2022 | 5 | 2022 |
On the security of a searchable anonymous attribute based encryption P Chaudhari, ML Das Mathematics and Computing: Third International Conference, ICMC 2017, Haldia …, 2017 | 5 | 2017 |
Privacy preserving signcryption scheme P Chaudhari, ML Das Distributed Computing and Internet Technology: 13th International Conference …, 2017 | 4 | 2017 |
Blockchain-Aided Privacy Preserving Framework for Federated Learning C Jain, P Chaudhari 2024 International Conference on Intelligent and Innovative Technologies in …, 2024 | 3 | 2024 |
PAC: privacy preserving proxy re-encryption for access control in public cloud P Chaudhari, ML Das Information Security Journal: A Global Perspective 31 (5), 612-627, 2022 | 3 | 2022 |
Security Weaknesses of an" Anonymous Attribute Based Encryption" appeared in ASIACCS'13 P Chaudhari, ML Das, A Mathuria Cryptology ePrint Archive, 2014 | 3 | 2014 |
Enhanced SAFER+ algorithm for bluetooth to withstand against key pairing attack P Chaudhari, H Diwanji Advances in Computing and Information Technology: Proceedings of the Second …, 2012 | 3 | 2012 |
Blockchain in Supply Chain Management S Surati, B Shrimali, H Trivedi, P Chaudhari Blockchain and its Applications in Industry 4.0, 61-98, 2023 | 2 | 2023 |
Privacy-preserving cost-effective work distribution with fine-grained access control for mobile crowdsensing P Chaudhari International Journal of Security and Networks 18 (2), 106-116, 2023 | 2 | 2023 |
Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control P Chaudhari, ML Das, D Dasgupta Information Systems Security: 13th International Conference, ICISS 2017 …, 2017 | 2 | 2017 |
Cryptanalysis of searchable anonymous attribute based encryption P Chaudhari, ML Das Cryptology ePrint Archive, 2016 | 2 | 2016 |
Cryptanalysis of Authentication Protocol for Cloud Assisted IoT Environment N Doshi, P Chaudhari Procedia Computer Science 220, 886-891, 2023 | 1 | 2023 |
Data Privacy Attacks on Federated Learning C Jain, P Chaudhari International Conference on Information and Communication Technology for …, 2024 | | 2024 |
On the Security of Privacy-Preserving Bilateral Attribute-Based Encryption P Chaudhari, N Doshi International Conference On Innovative Computing And Communication, 229-236, 2024 | | 2024 |