default search action
Nisha Panwar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Peeyush Gupta, Dhrubajyoti Ghosh:
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases. IEEE Trans. Dependable Secur. Comput. 21(3): 1355-1371 (2024) - 2023
- [j12]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Komal Kumari, Swagnik Roychoudhury:
Information-Theoretically Secure and Highly Efficient Search and Row Retrieval. Proc. VLDB Endow. 16(10): 2391-2403 (2023) - [i14]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta:
Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data. IACR Cryptol. ePrint Arch. 2023: 133 (2023) - 2022
- [j11]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Attestable Sensor Data Capture in IoT Environments. ACM Trans. Internet Things 3(1): 3:1-3:30 (2022) - [j10]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data. IEEE Trans. Knowl. Data Eng. 34(2): 843-864 (2022) - [j9]Shantanu Sharma, Sharad Mehrotra, Nisha Panwar, Nalini Venkatasubramanian, Peeyush Gupta, Shanshan Han, Guoxi Wang:
Quest: Privacy-Preserving Monitoring of Network Data: A System for Organizational Response to Pandemics. IEEE Trans. Serv. Comput. 15(3): 1233-1250 (2022) - [c16]Shantanu Sharma, Sharad Mehrotra, Nisha Panwar, Nalini Venkatasubramanian, Peeyush Gupta, Shanshan Han, Guoxi Wang:
QUEST: Privacy-Preserving Monitoring of Network Data. SERVICES 2022: 21 - 2021
- [j8]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes. ACM Trans. Cyber Phys. Syst. 5(1): 3:1-3:34 (2021) - [c15]Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
PRISM: Private Verifiable Set Computation over Multi-Owner Outsourced Databases. SIGMOD Conference 2021: 1116-1128 - [c14]Shuangsheng Lou, Nisha Panwar, Gagan Agrawal:
Integrity Verification for Streaming IoT Applications with a Minimalist Logging Scheme. SMARTCOMP 2021: 197-202 - [i13]Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
Prism: Private Verifiable Set Computation over Multi-Owner Outsourced Databases. CoRR abs/2104.03354 (2021) - [i12]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Attestable Sensor Data Capture in IoT Environments. CoRR abs/2108.02293 (2021) - 2020
- [c13]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries. CODASPY 2020: 165-167 - [c12]Nisha Panwar, Shantanu Sharma, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
IoT Expunge: Implementing Verifiable Retention of IoT Data. CODASPY 2020: 283-294 - [c11]Lukasz Krzywiecki, Hannes Salin, Nisha Panwar, Mykola Pavlov:
Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks. NCA 2020: 1-8 - [c10]Nisha Panwar, Shantanu Sharma:
Security and Privacy Aspects in 5G Networks. NCA 2020: 1-5 - [i11]Nisha Panwar, Shantanu Sharma, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
IoT Expunge: Implementing Verifiable Retention of IoT Data. CoRR abs/2003.04969 (2020) - [i10]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes. CoRR abs/2004.03841 (2020) - [i9]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version. CoRR abs/2004.13115 (2020) - [i8]Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang:
Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets. CoRR abs/2005.02510 (2020)
2010 – 2019
- 2019
- [j7]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries. Proc. VLDB Endow. 12(9): 1030-1043 (2019) - [c9]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. CODASPY 2019: 49-60 - [c8]Lukasz Krzywiecki, Patryk Koziel, Nisha Panwar:
Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks. NCA 2019: 1-4 - [c7]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Sensor Data Attestation in Smart Environment. NCA 2019: 1-9 - [i7]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. CoRR abs/1901.08618 (2019) - [i6]Nisha Panwar, Shantanu Sharma, Sharad Mehrotra, Lukasz Krzywiecki, Nalini Venkatasubramanian:
Smart Home Survey on Security and Privacy. CoRR abs/1904.05476 (2019) - [i5]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Sensor Data Attestation in Smart Environment. CoRR abs/1908.10033 (2019) - 2018
- [j6]Lukasz Krzywiecki, Kamil Kluczniak, Patryk Koziel, Nisha Panwar:
Privacy-oriented dependency via deniable SIGMA protocol. Comput. Secur. 79: 53-67 (2018) - [c6]Mamadou H. Diallo, Nisha Panwar, Roberto Yus, Sharad Mehrotra:
Trustworthy Privacy Policy Translation in Untrusted IoT Environments. IoTBDS 2018: 132-143 - [c5]Mamadou H. Diallo, Nisha Panwar, Sharad Mehrotra, Ardalan Amiri Sani:
Trustworthy Sensing in an Untrusted IoT Environment. PerCom Workshops 2018: 468-471 - [i4]Shlomi Dolev, Nisha Panwar:
Peripheral Authentication for Parked Vehicles over Wireless Radio Communication. CoRR abs/1807.11685 (2018) - 2017
- [j5]Nisha Panwar, Shantanu Sharma:
The excessive power of Ctrl+C and Ctrl+V in CS research and career development. XRDS 24(2): 10-11 (2017) - [j4]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Dynamic attribute based vehicle authentication. Wirel. Networks 23(4): 1045-1062 (2017) - 2016
- [j3]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Optical PUF for Non-Forwardable Vehicle Authentication. Comput. Commun. 93: 52-67 (2016) - [j2]Nisha Panwar, Shantanu Sharma, Awadhesh Kumar Singh:
A survey on 5G: The next generation of mobile communication. Phys. Commun. 18: 64-84 (2016) - [j1]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Vehicle authentication via monolithically certified public key and attributes. Wirel. Networks 22(3): 879-896 (2016) - [c4]Shlomi Dolev, Nisha Panwar:
Peripheral authentication for autonomous vehicles. NCA 2016: 282-285 - 2015
- [c3]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Optical PUF for Non Forwardable Vehicle Authentication. NCA 2015: 204-207 - [i3]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Vehicle Authentication via Monolithically Certified Public Key and Attributes. CoRR abs/1507.04491 (2015) - [i2]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Vehicle to Vehicle Authentication. CoRR abs/1508.01324 (2015) - [i1]Nisha Panwar, Shantanu Sharma, Awadhesh Kumar Singh:
A Survey on 5G: The Next Generation of Mobile Communication. CoRR abs/1511.01643 (2015) - 2014
- [c2]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Dynamic Attribute Based Vehicle Authentication. NCA 2014: 1-8 - 2013
- [c1]Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal:
Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond. ASCoMS@SAFECOMP 2013
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-07 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint