2007 | ||
---|---|---|
8 | EE | Anshul Singhal, Vaibhav Garg, Anish Mathuria: Analysis and Enhancement of Two Key Agreement Protocols for Wireless Networks. COMSWARE 2007 |
2006 | ||
7 | EE | Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria: An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. ACISP 2006: 371-382 |
6 | EE | Praveen Kumar Vadnala, Anish Mathuria: An Efficient Key Assignment Scheme for Access Control in a Hierarchy. ICISS 2006: 205-219 |
2004 | ||
5 | EE | Pawan Jadia, Anish Mathuria: Efficient Secure Aggregation in Sensor Networks. HiPC 2004: 40-49 |
2002 | ||
4 | EE | Anish Mathuria: Using a Formal Technique for Protocol Idealization: A Cautionary Note. DEXA Workshops 2002: 468-472 |
2000 | ||
3 | EE | Colin Boyd, Anish Mathuria: Key establishment protocols for secure mobile communications: a critical survey. Computer Communications 23(5-6): 575-587 (2000) |
1999 | ||
2 | Michiharu Kudo, Anish Mathuria: An Extended Logic for Analyzing Timed-Release Public-Key Protocols. ICICS 1999: 183-198 | |
1998 | ||
1 | EE | Colin Boyd, Anish Mathuria: Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. ACISP 1998: 344-355 |
1 | Colin Boyd | [1] [3] [7] |
2 | Kim-Kwang Raymond Choo | [7] |
3 | Vaibhav Garg | [8] |
4 | Pawan Jadia | [5] |
5 | Michiharu Kudo | [2] |
6 | Anshul Singhal | [8] |
7 | Praveen Kumar Vadnala | [6] |