A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing YS Rao Future Generation Computer Systems 67, 133-151, 2017 | 149 | 2017 |
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment V Odelu, AK Das, YS Rao, S Kumari, MK Khan, KKR Choo Computer Standards & Interfaces 54, 3-9, 2017 | 115 | 2017 |
Efficient attribute-based signature and signcryption realizing expressive access structures YS Rao, R Dutta International Journal of Information Security 15, 81-109, 2016 | 56 | 2016 |
Recipient anonymous ciphertext-policy attribute based encryption YS Rao, R Dutta Information Systems Security: 9th International Conference, ICISS 2013 …, 2013 | 36 | 2013 |
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party D Mishra, D Dharminder, P Yadav, YS Rao, P Vijayakumar, N Kumar Journal of Information Security and Applications 55, 102648, 2020 | 29 | 2020 |
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model YS Rao, R Dutta Australasian Conference on Information Security and Privacy, 209-225, 2014 | 29 | 2014 |
Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption YS Rao, R Dutta Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International …, 2013 | 22 | 2013 |
Computational friendly attribute-based encryptions with short ciphertext YS Rao, R Dutta Theoretical Computer Science 668, 1-26, 2017 | 17 | 2017 |
Expressive attribute based signcryption with constant-size ciphertext YS Rao, R Dutta Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014 | 16 | 2014 |
Attribute‐based online/offline signcryption scheme YS Rao International Journal of Communication Systems 30 (16), e3322, 2017 | 15 | 2017 |
Computationally efficient expressive key-policy attribute based encryption schemes with constant-size ciphertext YS Rao, R Dutta Information and Communications Security: 15th International Conference …, 2013 | 14 | 2013 |
Dynamic ciphertext-policy attribute-based encryption for expressive access policy YS Rao, R Dutta Distributed Computing and Internet Technology: 10th International Conference …, 2014 | 12 | 2014 |
Computationally efficient dual-policy attribute based encryption with short ciphertext YS Rao, R Dutta Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013 | 12 | 2013 |
Efficient attribute based access control mechanism for vehicular ad hoc network YS Rao, R Dutta Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 11 | 2013 |
Attribute-based key-insulated signature for boolean formula Y Sreenivasa Rao, R Dutta International Journal of Computer Mathematics 93 (6), 864-888, 2016 | 8 | 2016 |
Bandwidth-efficient attribute-based key-insulated signatures with message recovery YS Rao, R Dutta Information Sciences 369, 648-673, 2016 | 7 | 2016 |
Computationally efficient secure access control for vehicular ad hoc networks YS Rao, R Dutta Information Systems Security: 8th International Conference, ICISS 2012 …, 2012 | 7 | 2012 |
Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment S Bera, S Prasad, YS Rao, AK Das, Y Park Journal of Information Security and Applications 75, 103482, 2023 | 5 | 2023 |
Fully secure bandwidth‐efficient anonymous ciphertext‐policy attribute‐based encryption Y Sreenivasa Rao, R Dutta Security and Communication Networks 8 (18), 4157-4176, 2015 | 5 | 2015 |
Privacy-preserving decentralized key-policy attribute-based encryption schemes with fast decryption YS Rao Information Systems Security: 11th International Conference, ICISS 2015 …, 2015 | 3 | 2015 |