Discovering frequent patterns in sensitive data R Bhaskar, S Laxman, A Smith, A Thakurta Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010 | 309 | 2010 |
Noiseless database privacy R Bhaskar, A Bhowmick, V Goyal, S Laxman, A Thakurta Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 116 | 2011 |
Cerium doped heavy metal fluoride glasses, a possible alternative for electromagnetic calorimetry E Auffray, D Bouttet, I Dafinei, J Fay, P Lecoq, JA Mares, M Martini, ... Nuclear Instruments and Methods in Physics Research Section A: Accelerators …, 1996 | 79 | 1996 |
Improved bounds on security reductions for discrete log based signatures S Garg, R Bhaskar, SV Lokam Annual International Cryptology Conference, 93-107, 2008 | 69 | 2008 |
Techniques for representing keywords in an encrypted search index to prevent histogram-based attacks SV Lokam, A Manchepalli, B Ashok, SP Karanth, R Bhaskar US Patent 8,819,451, 2014 | 61 | 2014 |
Transparent virtual currency using verifiable tokens S Guha, R Bhaskar, S Laxman, P Naldurg US Patent App. 13/159,224, 2012 | 58 | 2012 |
An efficient group key agreement protocol for ad hoc networks D Augot, R Bhaskar, V Issarny, D Sacchetti Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005 | 47 | 2005 |
An efficient group key agreement protocol for ad hoc networks D Augot, R Bhaskar, V Issarny, D Sacchetti Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005 | 47 | 2005 |
User friendly two factor authentication R Bhaskar, K Sharma US Patent App. 15/740,648, 2018 | 43 | 2018 |
Efficient Galois field arithmetic on SIMD architectures R Bhaskar, PK Dubey, V Kumar, A Rudra Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and …, 2003 | 40 | 2003 |
On the (in) feasibility of attribute inference attacks on machine learning models BZH Zhao, A Agrawal, C Coburn, HJ Asghar, R Bhaskar, MA Kaafar, ... 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 232-251, 2021 | 37 | 2021 |
Efficient authentication for reactive routing protocols R Bhaskar, J Herranz, F Laguillaumie 20th International Conference on Advanced Information Networking and …, 2006 | 30 | 2006 |
Aggregate designated verifier signatures and application to secure routing R Bhaskar, J Herranz, F Laguillaumie International Journal of Security and Networks 2 (3-4), 192-201, 2007 | 28 | 2007 |
A three round authenticated group key agreement protocol for ad hoc networks D Augot, R Bhaskar, V Issarny, D Sacchetti Pervasive and Mobile Computing 3 (1), 36-52, 2007 | 27 | 2007 |
Non observability in the random oracle model P Ananth, R Bhaskar International Conference on Provable Security, 86-103, 2013 | 20 | 2013 |
Group key agreement in ad hoc networks R Bhaskar INRIA, 2003 | 19 | 2003 |
Data level privacy preserving: A stochastic perturbation approach based on differential privacy C Ma, L Yuan, L Han, M Ding, R Bhaskar, J Li IEEE Transactions on Knowledge and Data Engineering 35 (4), 3619-3631, 2021 | 13 | 2021 |
On inferring training data attributes in machine learning models BZH Zhao, HJ Asghar, R Bhaskar, MA Kaafar arXiv preprint arXiv:1908.10558, 2019 | 13 | 2019 |
Verito: A Practical System for Transparency and Accountability in Virtual Economies. R Bhaskar, S Guha, S Laxman, P Naldurg NDSS, 2013 | 13 | 2013 |
Agdh (asymmetric group diffie hellman) an efficient and dynamic group key agreement protocol for ad hoc networks R Bhaskar, D Augot, C Adjih, P Mühlethaler, S Boudjit New Technologies, Mobility and Security, 633-633, 2007 | 12 | 2007 |