default search action
Manik Lal Das
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Riyanka Jena, Priyanka Singh, Manoranjan Mohanty, Manik Lal Das:
PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications. Computing 106(10): 3309-3333 (2024) - 2022
- [j35]Nidhi Desai, Manik Lal Das, Payal Chaudhari, Naveen Kumar:
Background knowledge attacks in privacy-preserving data publishing models. Comput. Secur. 122: 102874 (2022) - [j34]Amit Kumar Dwivedi, Naveen Kumar, Manik Lal Das:
Group data freshness scheme for outsourced data in distributed systems. Future Gener. Comput. Syst. 133: 141-152 (2022) - [j33]Payal Chaudhari, Manik Lal Das:
PAC: Privacy preserving proxy re-encryption for access control in public cloud. Inf. Secur. J. A Glob. Perspect. 31(5): 612-627 (2022) - [j32]Payal Chaudhari, Manik Lal Das:
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption. IEEE Trans. Serv. Comput. 15(2): 1036-1044 (2022) - [c54]Amit Kumar Dwivedi, Naveen Kumar, Manik Lal Das:
Distributed Integrity Auditing of Cloud data using Edge Computing and Blockchain. ANTS 2022: 320-325 - 2021
- [j31]Manik Lal Das:
Secure resource sharing in grid system without public key settings. Int. J. Soc. Comput. Cyber Phys. Syst. 2(3): 194-211 (2021) - [j30]Nidhi Desai, Manik Lal Das:
Rule based anonymisation against inference attack in social networks. Int. J. Soc. Comput. Cyber Phys. Syst. 2(3): 212-228 (2021) - [j29]Riddhi Solani, Manik Lal Das:
iCOPS: insider attack detection in distributed file systems. Int. J. Soc. Comput. Cyber Phys. Syst. 2(3): 244-255 (2021) - [j28]Payal Chaudhari, Manik Lal Das:
Privacy Preserving Searchable Encryption with Fine-Grained Access Control. IEEE Trans. Cloud Comput. 9(2): 753-762 (2021) - [c53]Bhautik Gosai, Manik Lal Das:
Data Deduplication Scheme with Multiple Key Servers in Public Clouds. ANTS 2021: 272-277 - [c52]Hardik Gajera, Manik Lal Das:
Fine-grained Data Deduplication and proof of storage Scheme in Public Cloud Storage. COMSNETS 2021: 237-241 - [c51]Deepti Saraswat, Manik Lal Das:
Edge-enabled Secure Healthcare System. ICC Workshops 2021: 1-6 - 2020
- [j27]Manik Lal Das, Pardeep Kumar, Andrew Martin:
Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications. Wirel. Pers. Commun. 110(1): 339-353 (2020) - [c50]Hardik Gajera, Manik Lal Das:
Privc: Privacy Preserving Verifiable Computation. COMSNETS 2020: 298-305 - [c49]Kirtan Patel, Manik Lal Das:
Transcript Management Using Blockchain Enabled Smart Contracts. ICDCIT 2020: 392-407 - [c48]Rinoy Macwan, Sankha Das, Manik Lal Das:
GIDS: Anomaly Detection Using Generative Adversarial Networks. SSCC 2020: 244-251 - [i22]Tikam Alma, Manik Lal Das:
Web Application Attack Detection using Deep Learning. CoRR abs/2011.03181 (2020) - [i21]Yash Mehta, Dev Patel, Manik Lal Das:
On Aadhaar Identity Management System. CoRR abs/2012.04215 (2020)
2010 – 2019
- 2019
- [j26]Dhwani Patel, Manik Lal Das:
TIDE: tampered image detection using mutual information. Int. J. Multim. Intell. Secur. 3(3): 205-220 (2019) - [j25]Ainish Dave, Hardik Gajera, Manik Lal Das:
Privacy-preserving targeted online advertising. Int. J. Soc. Comput. Cyber Phys. Syst. 2(2): 132-145 (2019) - [j24]Sarita Agrawal, Manik Lal Das, Javier López:
Detection of Node Capture Attack in Wireless Sensor Networks. IEEE Syst. J. 13(1): 238-247 (2019) - [c47]Nidhi Gupta, Manik Lal Das, Sukumar Nandi:
LandLedger: Blockchain-powered Land Property Administration System. ANTS 2019: 1-6 - [c46]Ruchi Kachhia, Prachi Agrawal, Manik Lal Das:
Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding. ICDCIT 2019: 339-348 - [c45]Hardik Gajera, Matthieu Giraud, David Gérault, Manik Lal Das, Pascal Lafourcade:
Verifiable and Private Oblivious Polynomial Evaluation. WISTP 2019: 49-65 - 2018
- [j23]Rahul Saranjame, Manik Lal Das:
Securing Digital Image from Malicious Insider Attacks. Int. J. Comput. Vis. Image Process. 8(2): 49-58 (2018) - [c44]Jinita Patel, Manik Lal Das, Sukumar Nandi:
On the Security of Remote Key Less Entry for Vehicles. ANTS 2018: 1-6 - [c43]Vishal Maral, Nachiket Trivedi, Manik Lal Das:
Auditing Access to Private Data on Android Platform. ICDCIT 2018: 105-111 - [c42]K. Hemantha, Nidhi Desai, Manik Lal Das:
On Minimality Attack for Privacy-Preserving Data Publishing. SSCC 2018: 324-335 - [c41]Hardik Gajera, Shruti Naik, Manik Lal Das:
MedCop: Verifiable Computation for Mobile Healthcare System. SSCC 2018: 471-482 - [i20]Atrayee Deb, Saloni Dalal, Manik Lal Das:
DigiLock: User-controlled and Server-aware Digital Locker System. CoRR abs/1810.08464 (2018) - 2017
- [j22]Sarita Agrawal, Manik Lal Das:
Mutual healing enabled group-key distribution protocol in Wireless Sensor Networks. Comput. Commun. 112: 131-140 (2017) - [c40]Nandan Parikh, Manik Lal Das:
Privacy-preserving services in VANET with misbehavior detection. ANTS 2017: 1-6 - [c39]Ritu Sharma, Manik Lal Das:
On the verification of conjunctive keyword search results using authenticated crawlers. COMSNETS 2017: 71-78 - [c38]Arjun Londhey, Manik Lal Das:
Efficient Image Authentication Scheme Using Genetic Algorithms. ICDCIT 2017: 172-180 - [c37]Payal Chaudhari, Manik Lal Das:
Privacy Preserving Signcryption Scheme. ICDCIT 2017: 196-209 - [c36]Payal Chaudhari, Manik Lal Das, Dipankar Dasgupta:
Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control. ICISS 2017: 88-103 - [c35]Nachiket Trivedi, Manik Lal Das:
MalDetec: A Non-root Approach for Dynamic Malware Detection in Android. ICISS 2017: 231-240 - [c34]Payal Chaudhari, Manik Lal Das:
On the Security of a Searchable Anonymous Attribute Based Encryption. ICMC 2017: 16-25 - [c33]Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade:
Verifiable Private Polynomial Evaluation. ProvSec 2017: 487-506 - [i19]Rahul Saranjame, Manik Lal Das:
Image Authentication using Visual Cryptography. CoRR abs/1711.09032 (2017) - [i18]Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade:
Verifiable Private Polynomial Evaluation. IACR Cryptol. ePrint Arch. 2017: 756 (2017) - 2016
- [c32]Sarita Agrawal, Manik Lal Das:
Node revocation and key update protocol in wireless sensor networks. ANTS 2016: 1-6 - [c31]Sarita Agrawal, Jay Patel, Manik Lal Das:
Pairing based mutual healing in wireless sensor networks. COMSNETS 2016: 1-8 - [c30]Hardik Gajera, Shruti Naik, Manik Lal Das:
On the Security of "Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems". ICISS 2016: 324-335 - [c29]Jay Dave, Manik Lal Das:
Securing SQL with Access Control for Database as a Service Model. ICTCS 2016: 104:1-104:6 - [i17]Payal Chaudhari, Manik Lal Das:
Cryptanalysis of Searchable Anonymous Attribute Based Encryption. IACR Cryptol. ePrint Arch. 2016: 347 (2016) - 2015
- [j21]Manik Lal Das:
Key-escrow free multi-signature scheme using bilinear pairings. Groups Complex. Cryptol. 7(1): 47-57 (2015) - [c28]Manik Lal Das:
Privacy and Security Challenges in Internet of Things. ICDCIT 2015: 33-48 - [c27]Punit Mehta, Jigar Sharda, Manik Lal Das:
SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data. ICISS 2015: 192-206 - [c26]Payal Chaudhari, Manik Lal Das, Anish Mathuria:
On Anonymous Attribute Based Encryption. ICISS 2015: 378-392 - [c25]Sarita Agrawal, Manik Lal Das, Anish Mathuria, Sanjay Srivastava:
Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network. ICISS 2015: 419-440 - [c24]Naveen Kumar, Anish Mathuria, Manik Lal Das:
Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud. SSCC 2015: 36-44 - [c23]Naveen Kumar, Anish Mathuria, Manik Lal Das:
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System. TrustCom/BigDataSE/ISPA (1) 2015: 1249-1254 - [i16]Sarita Agrawal, Jay Patel, Manik Lal Das:
Pairing Based Mutual Healing in Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2015: 538 (2015) - [i15]Payal Chaudhari, Manik Lal Das:
Privacy-preserving Attribute Based Searchable Encryption. IACR Cryptol. ePrint Arch. 2015: 899 (2015) - 2014
- [j20]Rachit Mittal, Manik Lal Das:
Secure Node Localization in Mobile Sensor Networks. Int. J. Wirel. Networks Broadband Technol. 3(1): 18-33 (2014) - [j19]Jaydeep Solanki, Aenik Shah, Manik Lal Das:
Secure Patrol: Patrolling Against Buffer Overflow Exploits. Inf. Secur. J. A Glob. Perspect. 23(3): 107-117 (2014) - [c22]Raghuvir Songhela, Manik Lal Das:
Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol. SPACE 2014: 171-182 - [i14]Payal Chaudhari, Manik Lal Das, Anish Mathuria:
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13. IACR Cryptol. ePrint Arch. 2014: 1028 (2014) - 2013
- [c21]Naveen Kumar, Anish Mathuria, Manik Lal Das, Kanta Matsuura:
Improving security and efficiency of time-bound access to outsourced data. COMPUTE 2013: 9:1-9:8 - [c20]Naveen Kumar, Anish Mathuria, Manik Lal Das:
Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper). ICISS 2013: 191-198 - [c19]Manik Lal Das:
Strong Security and Privacy of RFID System for Internet of Things Infrastructure. SPACE 2013: 56-69 - [i13]Harsh N. Thakker, Mayank Saha, Manik Lal Das:
Reputation Algebra for Cloud-based Anonymous Data Storage Systems. CoRR abs/1304.4002 (2013) - [i12]Raghuvir Songhela, Manik Lal Das:
Wide-weak Privacy Preserving RFID Mutual Authentication Protocol. IACR Cryptol. ePrint Arch. 2013: 787 (2013) - 2012
- [j18]Siva Charan Muraharirao, Manik Lal Das:
Digital Image Protection using Keyed Hash Function. Int. J. Comput. Vis. Image Process. 2(2): 36-47 (2012) - [j17]Chandrapal Chahar, Vishal Singh Chauhan, Manik Lal Das:
Code Analysis for Software and System Security Using Open Source Tools. Inf. Secur. J. A Glob. Perspect. 21(6): 346-352 (2012) - [c18]C. Anudeep, Manik Lal Das:
An Improved Scheme for False Data Filtering in Wireless Sensor Networks. ICDCIT 2012: 62-70 - [c17]Anil Mundra, Anish Mathuria, Manik Lal Das:
Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation. ICDCIT 2012: 166-176 - [c16]Manik Lal Das:
Grids Security without Public Key Settings. ICDCIT 2012: 253-254 - [c15]Sarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier López:
A Novel Key Update Protocol in Mobile Sensor Networks. ICISS 2012: 194-207 - [c14]Renu Aggarwal, Manik Lal Das:
RFID security in the context of "internet of things". SECURIT 2012: 51-56 - 2011
- [j16]Manik Lal Das:
A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel. Cryptologia 35(1): 58-72 (2011)
2000 – 2009
- 2009
- [j15]Thulasi Goriparthi, Manik Lal Das, Ashutosh Saxena:
An improved bilinear pairing based remote user authentication scheme. Comput. Stand. Interfaces 31(1): 181-185 (2009) - [j14]Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:
Algorithms and Approaches of Proxy Signature: A Survey. Int. J. Netw. Secur. 9(3): 264-284 (2009) - [j13]Praneetha R. Bayyapu, Manik Lal Das:
An Improved and Efficient Micro-payment Scheme. J. Theor. Appl. Electron. Commer. Res. 4(1): 91-100 (2009) - [j12]Manik Lal Das:
Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3): 1086-1090 (2009) - [i11]Animesh Agarwal, Vaibhav Shrimali, Manik Lal Das:
GSM Security Using Identity-based Cryptography. CoRR abs/0911.0727 (2009) - 2008
- [j11]Vidhani Kumar, Manik Lal Das:
Securing Wireless Sensor Networks with Public Key Techniques. Ad Hoc Sens. Wirel. Networks 5(3-4): 189-201 (2008) - [j10]Manik Lal Das, Aakash Joshi:
Dynamic Program Update in Wireless Sensor Networks Using Orthogonality Principle. IEEE Commun. Lett. 12(6): 471-473 (2008) - [j9]Manik Lal Das:
Comments on "Improved Efficient Remote User Authentication Schemes". Int. J. Netw. Secur. 6(3): 282-284 (2008) - [j8]V. Lakshmi Narasimhan, Manik Lal Das:
Data and information security (DIS) for BS and MS programs: a proposal. ACM SIGCSE Bull. 40(4): 95-99 (2008) - [c13]Manik Lal Das:
Secure and Efficient Authentication Scheme for Remote Systems. ICIT 2008: 226-231 - [c12]Manik Lal Das, V. Lakshmi Narasimhan:
A Simple and Secure Authentication and Key Establishment Protocol. ICETET 2008: 844-849 - [c11]Manik Lal Das, Ravi Mukkamala:
Revisiting Bluetooth Security (Short Paper). ICISS 2008: 132-139 - [c10]Manik Lal Das:
Efficient user authentication and secure data transmission in wireless sensor networks. ICON 2008: 1-6 - [c9]Manik Lal Das, V. Lakshmi Narasimhan:
Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. ITNG 2008: 545-550 - [c8]Manik Lal Das, V. Lakshmi Narasimhan:
EARS: Efficient Entity Authentication in Remote Systems. ITNG 2008: 603-608 - [i10]Manik Lal Das:
A Flexible and Secure Remote Systems Authentication Scheme Using Smart Cards. CoRR abs/0801.0575 (2008) - [i9]Manik Lal Das:
On the Security of "an efficient and complete remote user authentication scheme". CoRR abs/0802.2112 (2008) - [i8]Manik Lal Das:
Comment - Practical Data Protection. CoRR abs/0804.4628 (2008) - 2007
- [j7]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Threshold key issuing in identity-based cryptosystems. Comput. Stand. Interfaces 29(2): 260-264 (2007) - [j6]Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings. Int. J. Netw. Secur. 4(3): 312-317 (2007) - [i7]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
A Dynamic ID-based Remote User Authentication Scheme. CoRR abs/0712.2235 (2007) - [i6]Manik Lal Das:
Comments on "Improved Efficient Remote User Authentication Schemes". CoRR abs/0712.3037 (2007) - [i5]Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings. CoRR abs/0712.3084 (2007) - 2006
- [j5]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:
A novel remote user authentication scheme using bilinear pairings. Comput. Secur. 25(3): 184-189 (2006) - [j4]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Identity Based Multisignatures. Informatica 17(2): 177-186 (2006) - [i4]Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:
Algorithms and Approaches of Proxy Signature: A Survey. CoRR abs/cs/0612098 (2006) - [i3]Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena:
Cryptanalysis of recently proposed Remote User Authentication Schemes. IACR Cryptol. ePrint Arch. 2006: 28 (2006) - 2005
- [j3]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:
Hierarchical key management scheme using polynomial interpolation. ACM SIGOPS Oper. Syst. Rev. 39(1): 40-47 (2005) - [c7]Manik Lal Das, Ashutosh Saxena:
SPAM: Secure Protocol for Authentication in Mobile-Communications. ICMB 2005: 23-27 - [c6]Ashutosh Saxena, Manik Lal Das, Anurag Gupta:
MMPS: A Versatile Mobile-to-Mobile Payment System. ICMB 2005: 400-405 - [c5]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. ITCC (1) 2005: 674-678 - [c4]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
Cryptanalysis and Improvement of a Multisignature Scheme. IWDC 2005: 398-403 - [c3]M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena:
An Effective Certificateless Signature Scheme Based on Bilinear Pairings. WOSIS 2005: 31-39 - [c2]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
ID-based Serial Multisignature Scheme using Bilinear Pairings. WOSIS 2005: 40-47 - [i2]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems. CoRR abs/cs/0506015 (2005) - 2004
- [j2]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
An Efficient Proxy Signature Scheme with Revocation. Informatica 15(4): 455-464 (2004) - [j1]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
A dynamic ID-based remote user authentication scheme. IEEE Trans. Consumer Electron. 50(2): 629-631 (2004) - [c1]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
A Novel Remote User Authentication Scheme Through Dynamic Login Identity. IWDC 2004: 532 - 2003
- [i1]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
Security Analysis of Lal and Awasthi's Proxy Signature Schemes. IACR Cryptol. ePrint Arch. 2003: 263 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint