A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing YS Rao Future Generation Computer Systems 67, 133-151, 2017 | 158 | 2017 |
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment V Odelu, AK Das, YS Rao, S Kumari, MK Khan, KKR Choo Computer Standards & Interfaces 54, 3-9, 2017 | 119 | 2017 |
Efficient attribute-based signature and signcryption realizing expressive access structures YS Rao, R Dutta International Journal of Information Security 15, 81-109, 2016 | 60 | 2016 |
Squeezed flow of polyethylene glycol and water based hybrid nanofluid over a magnetized sensor surface: a statistical approach MJ Babu, YS Rao, AS Kumar, CSK Raju, SA Shehzad, T Ambreen, ... International Communications in Heat and Mass Transfer 135, 106136, 2022 | 45 | 2022 |
Recipient anonymous ciphertext-policy attribute based encryption YS Rao, R Dutta Information Systems Security: 9th International Conference, ICISS 2013 …, 2013 | 37 | 2013 |
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party D Mishra, D Dharminder, P Yadav, YS Rao, P Vijayakumar, N Kumar Journal of Information Security and Applications 55, 102648, 2020 | 34 | 2020 |
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model YS Rao, R Dutta Australasian Conference on Information Security and Privacy, 209-225, 2014 | 30 | 2014 |
Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption YS Rao, R Dutta Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International …, 2013 | 23 | 2013 |
Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems S Rana, MS Obaidat, D Mishra, A Mishra, YS Rao The Journal of Supercomputing 78, 3696−3714, 2022 | 21 | 2022 |
Computational friendly attribute-based encryptions with short ciphertext YS Rao, R Dutta Theoretical Computer Science 668, 1-26, 2017 | 18 | 2017 |
Attribute‐based online/offline signcryption scheme YS Rao International Journal of Communication Systems 30 (16), e3322, 2017 | 16 | 2017 |
Expressive attribute based signcryption with constant-size ciphertext YS Rao, R Dutta Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014 | 16 | 2014 |
Computationally efficient expressive key-policy attribute based encryption schemes with constant-size ciphertext YS Rao, R Dutta Information and Communications Security: 15th International Conference …, 2013 | 15 | 2013 |
Dynamic ciphertext-policy attribute-based encryption for expressive access policy YS Rao, R Dutta Distributed Computing and Internet Technology: 10th International Conference …, 2014 | 13 | 2014 |
Computationally efficient dual-policy attribute based encryption with short ciphertext YS Rao, R Dutta Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013 | 13 | 2013 |
Efficient attribute based access control mechanism for vehicular ad hoc network YS Rao, R Dutta Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 11 | 2013 |
Attribute-based key-insulated signature for boolean formula Y Sreenivasa Rao, R Dutta International Journal of Computer Mathematics 93 (6), 864-888, 2016 | 8 | 2016 |
A score-level fusion method for protecting fingerprint and palmprint templates M Sandhya, Y Sreenivasa Rao, S Biswajeet, V Dilip Kumar, ... Security and Privacy: Select Proceedings of ICSP 2020, 1-11, 2021 | 7 | 2021 |
Bandwidth-efficient attribute-based key-insulated signatures with message recovery YS Rao, R Dutta Information Sciences 369, 648-673, 2016 | 7 | 2016 |
Computationally efficient secure access control for vehicular ad hoc networks YS Rao, R Dutta Information Systems Security: 8th International Conference, ICISS 2012 …, 2012 | 7 | 2012 |