|
Search the dblp DataBase
Vipul Goyal:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Vipul Goyal, Rohit Tripathy
An Efficient Solution to the ARP Cache Poisoning Problem. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:40-51 [Conf]
- Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
Attribute-based encryption for fine-grained access control of encrypted data. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:89-98 [Conf]
- Vipul Goyal, Abhishek Jain 0002, Jean-Jacques Quisquater
Improvements to Mitchell's Remote User Authentication Protocol. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:69-80 [Conf]
- Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han
The N/R One Time Password System. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:733-738 [Conf]
- Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
CompChall: Addressing Password Guessing Attacks. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:739-744 [Conf]
- Vipul Goyal
Fast Digital Certificate Revocation. [Citation Graph (0, 0)][DBLP] SEC, 2004, pp:489-500 [Conf]
- Vipul Goyal
Certificate Revocation Lists or Online Mechanisms. [Citation Graph (0, 0)][DBLP] WOSIS, 2004, pp:261-268 [Conf]
- Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
A new protocol to counter online dictionary attacks. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:2, pp:114-120 [Journal]
- Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:444-459 [Conf]
- Vipul Goyal
Reducing Trust in the PKG in Identity Based Cryptosystems. [Citation Graph (0, 0)][DBLP] CRYPTO, 2007, pp:430-447 [Conf]
Black-box accountable authority identity-based encryption. [Citation Graph (, )][DBLP]
Identity-based encryption with efficient revocation. [Citation Graph (, )][DBLP]
Position Based Cryptography. [Citation Graph (, )][DBLP]
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. [Citation Graph (, )][DBLP]
Password-Authenticated Session-Key Generation on the Internet in the Plain Model. [Citation Graph (, )][DBLP]
New Constructions for UC Secure Computation Using Tamper-Proof Hardware. [Citation Graph (, )][DBLP]
Resettably Secure Computation. [Citation Graph (, )][DBLP]
Efficient Two Party and Multi Party Computation Against Covert Adversaries. [Citation Graph (, )][DBLP]
Certificate Revocation Using Fine Grained Certificate Space Partitioning. [Citation Graph (, )][DBLP]
Covert Multi-Party Computation. [Citation Graph (, )][DBLP]
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy. [Citation Graph (, )][DBLP]
Bounded Ciphertext Policy Attribute Based Encryption. [Citation Graph (, )][DBLP]
On the round complexity of covert computation. [Citation Graph (, )][DBLP]
Universally Composable Multi-party Computation with an Unreliable Common Reference String. [Citation Graph (, )][DBLP]
Founding Cryptography on Tamper-Proof Hardware Tokens. [Citation Graph (, )][DBLP]
Vcache: Caching Dynamic Documents [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|