![]() |
| 2007 | ||
|---|---|---|
| 8 | EE | Anshul Singhal, Vaibhav Garg, Anish Mathuria: Analysis and Enhancement of Two Key Agreement Protocols for Wireless Networks. COMSWARE 2007 |
| 2006 | ||
| 7 | EE | Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria: An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. ACISP 2006: 371-382 |
| 6 | EE | Praveen Kumar Vadnala, Anish Mathuria: An Efficient Key Assignment Scheme for Access Control in a Hierarchy. ICISS 2006: 205-219 |
| 2004 | ||
| 5 | EE | Pawan Jadia, Anish Mathuria: Efficient Secure Aggregation in Sensor Networks. HiPC 2004: 40-49 |
| 2002 | ||
| 4 | EE | Anish Mathuria: Using a Formal Technique for Protocol Idealization: A Cautionary Note. DEXA Workshops 2002: 468-472 |
| 2000 | ||
| 3 | EE | Colin Boyd, Anish Mathuria: Key establishment protocols for secure mobile communications: a critical survey. Computer Communications 23(5-6): 575-587 (2000) |
| 1999 | ||
| 2 | Michiharu Kudo, Anish Mathuria: An Extended Logic for Analyzing Timed-Release Public-Key Protocols. ICICS 1999: 183-198 | |
| 1998 | ||
| 1 | EE | Colin Boyd, Anish Mathuria: Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. ACISP 1998: 344-355 |
| 1 | Colin Boyd | [1] [3] [7] |
| 2 | Kim-Kwang Raymond Choo | [7] |
| 3 | Vaibhav Garg | [8] |
| 4 | Pawan Jadia | [5] |
| 5 | Michiharu Kudo | [2] |
| 6 | Anshul Singhal | [8] |
| 7 | Praveen Kumar Vadnala | [6] |