researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2017
2022
2023
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
A. U. Prem Sankar
Aashish Banati
Abey Jacob
Aditi Roy
Ajai Kumar
Anirudh M. Sivapriya
Ankita Bhargava
Anna Johnson
Anoop Kumar Pandey
Appala Naidu Tentu
Ashwin A Krishnan
B. R. Chandavarkar
B. S. Bindhumadhava
B. Shameedha Begum
Balaji Rajendran
BenoƮt Ampeau
C. S. Sreeja
K. K. Soundra Pandian
Mohammed Misbahuddin
P. V. Ananda Mohan
Filter by Top terms
[+]
OR
AND
NOT
1
applications
authentication
block
certificate
cloud
conference
cryptographic
digital
hash
implementation
india
infrastructure
international
iot
key
lightweight
management
pki
public
using
PKIA (pkia)
Editions
Publications
Viewing Publication 1 - 39 from 39
2023
IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2023, Bangalore, India, September 8-9, 2023
IEEE,
2023.
[doi]
Cryptographic Validation of Lightweight Block ciphers and Hash Functions
Uma Devi
,
Abey Jacob
.
pkia 2023
:
1-10
[doi]
Scalable Model-Based Decentralized Applications in the Cloud Using Certificates and Blockchains
Felix HƤrer
.
pkia 2023
:
1-8
[doi]
Hash-based Digital Signatures- A tutorial review
P. V. Ananda Mohan
.
pkia 2023
:
1-8
[doi]
Lightweight Certificate-less Digital Signature Scheme for WSNs
Rhithick Murali
,
Vivek Arunachalam
,
S. Jeevanantham
,
C. Venkatesan
,
Rebekka B. 0001
.
pkia 2023
:
1-7
[doi]
Cryptographic Challenges and Security in Post Quantum Cryptography Migration: A Prospective Approach
Anoop Kumar Pandey
,
Aashish Banati
,
Balaji Rajendran
,
Sithu D. Sudarsan
,
K. K. Soundra Pandian
.
pkia 2023
:
1-8
[doi]
An Architecture for Risk-Based Authentication System in a Multi-Server Environment
R. M. Pramila
,
Samiksha Shukla
.
pkia 2023
:
1-5
[doi]
FPGA Implementation of the AES Algorithm with Lightweight LFSR-Based Approach and Optimized Key Expansion
Samruddhi Purohit
,
Vaishnavi Deshpande
,
Vaishali V. Ingale
.
pkia 2023
:
1-7
[doi]
Enhancing PKI Security in Hyperledger Fabric with an Indigenous Certificate Authority
M. Gayathri Santhosh
,
T. R. Reshmi
.
pkia 2023
:
1-5
[doi]
An ECC based Anonymous Authentication Protocol for Internet of Things
Appala Naidu Tentu
,
Renuka Cheeturi
.
pkia 2023
:
1-6
[doi]
2022
IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, Bangalore, India, September 9-10, 2022
IEEE,
2022.
[doi]
PKI for IoT using the DNS infrastructure
Sandoche Balakrichenan
,
Ibrahim Ayoub
,
BenoƮt Ampeau
.
pkia 2022
:
1-8
[doi]
Security Analysis of LDPC Code-Based Encryption
Dibyasree Guha
,
Debasish Bera
,
Sourabh Biswas
.
pkia 2022
:
1-7
[doi]
Towards Automated PKI Trust Transfer for IoT
Joel Hƶglund
,
Shahid Raza
,
Martin Furuhed
.
pkia 2022
:
1-8
[doi]
Unconfirmed Transactions in Cryptocurrency: Reasons, Statistics, and Mitigation
Harshal Shridhar Kallurkar
,
B. R. Chandavarkar
.
pkia 2022
:
1-7
[doi]
A JSON Web Signature Based Adaptive Authentication Modality for Healthcare Applications
Vivin Krishnan
,
C. S. Sreeja
,
Sumitra Binu
,
Mohammed Misbahuddin
.
pkia 2022
:
1-8
[doi]
Improved PKI Certificate Lifecycle Management With Centralized Device Management For Industrial IoT
Ashwin A Krishnan
,
Satish Kumar Rajendran
,
T. K. Sunil Kumar
.
pkia 2022
:
1-5
[doi]
Experimentation on Usage of PQC Algorithms for eSign
Pavan Kurariya
,
Ankita Bhargava
,
Srikanth Sailada
,
N. Subramanian
,
Jahnavi Bodhankar
,
Ajai Kumar
.
pkia 2022
:
1-6
[doi]
Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices
Mohammed Misbahuddin
,
Rashmi Harish
,
K. Ananya
.
pkia 2022
:
1-9
[doi]
FPGA based High Throughput Substitution Box Architectures for Lightweight Block Ciphers
Ruby Mishra
,
Manish Okade
,
Kamalakanta Mahapatra
.
pkia 2022
:
1-7
[doi]
Public Key Cryptographic Implementation Validation: A Review
P. V. Ananda Mohan
,
Abey Jacob
,
Raghavendra S. Patil
.
pkia 2022
:
1-8
[doi]
A Study of PKI Ecosystem in South Asian and Oceania Countries
Lavanya Palani
,
Anoop Kumar Pandey
,
Balaji Rajendran
,
B. S. Bindhumadhava
,
S. D. Sudarsan
.
pkia 2022
:
1-5
[doi]
Radian: Leveraging PKI for Long-Term Validation Enabled Digital Academic Testimonials - A Case-Study
Souvik Pan
,
Dhiman Saha
,
Rajat Moona
.
pkia 2022
:
1-8
[doi]
Evolving Role of PKI in Facilitating Trust
Vishwas T. Patil
,
R. K. Shyamasundar
.
pkia 2022
:
1-7
[doi]
Random Number Generation for PKI Using Controlled Anderson PUF
Aditi Roy
,
Kokila Jagadeesh
,
Ramasubramanian Natarajan
,
B. Shameedha Begum
.
pkia 2022
:
1-6
[doi]
A hybrid hyperchaotic based dynamic keystream generator using perturbance process for public key infrastructure application
Anirudh M. Sivapriya
,
Dilip Kumar Barman
,
K. K. Soundra Pandian
.
pkia 2022
:
1-6
[doi]
2017
2017 International Conference on Public Key Infrastructure and its Applications, PKIA 2017, Bengaluru, India, November 14-15, 2017
IEEE,
2017.
[doi]
Tutorials: Lattice based cryptgraphy
Rishiraj Bhattacharyya
.
pkia 2017
:
16
[doi]
XML wrapping attack mitigation using positional token
Jitendra Kumar
,
Balaji Rajendran
,
B. S. Bindhumadhava
,
N. Sarat Chandra Babu
.
pkia 2017
:
36-42
[doi]
Keynote address: Quo Vadis PKI?
C. E. Veni Madhavan
.
pkia 2017
:
8
[doi]
An enhanced secure authentication scheme with user anonymity in mobile cloud computing
R. Madhusudhan
,
K. S. Suvidha
.
pkia 2017
:
17-22
[doi]
Malsign: Threat analysis of signed and implicitly trusted malicious code
Soumajit Pal
,
Prabaharan Poornachandran
,
Manu R. Krishnan
,
A. U. Prem Sankar
,
Parvathy Sasikala
.
pkia 2017
:
23-27
[doi]
Digital token based remote administration
Anoop Kumar Pandey
,
Balaji Rajendran
,
B. S. Bindhumadhava
.
pkia 2017
:
63-66
[doi]
Secure access of multiple keywords over encrypted data in cloud environment using ECC-PKI and ECC ElGamal
Sourabh Prakash
,
Nitish Andola
,
S. Venkatesan 0002
.
pkia 2017
:
49-56
[doi]
Design and implementation of IP core for RoadRunneR-128 block cipher
Mitha Raj
,
K. Shinta Joseph
,
Josemon Tomy
,
K. S. Niveditha
,
Anna Johnson
,
R. Nandakumar
,
Mitu Raj
.
pkia 2017
:
57-62
[doi]
Evolution of PKI ecosystem
Balaji Rajendran
.
pkia 2017
:
9-10
[doi]
A study on remote data integrity checking techniques in cloud
C. Sasikala
,
C. Shoba Bindu
.
pkia 2017
:
43-48
[doi]
Lightning talks session 1: Trust management in PKI
Priyadarshi Singh
.
pkia 2017
:
13-15
[doi]
An online signature method using DNA based bio-hash for positive identification and non-repudiation
C. S. Sreeja
,
Mohammed Misbahuddin
.
pkia 2017
:
28-35
[doi]
Sign in
or
sign up
to see more results.