The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vipul Goyal: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Vipul Goyal, Rohit Tripathy
    An Efficient Solution to the ARP Cache Poisoning Problem. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:40-51 [Conf]
  2. Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
    Attribute-based encryption for fine-grained access control of encrypted data. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:89-98 [Conf]
  3. Vipul Goyal, Abhishek Jain 0002, Jean-Jacques Quisquater
    Improvements to Mitchell's Remote User Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:69-80 [Conf]
  4. Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han
    The N/R One Time Password System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:733-738 [Conf]
  5. Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
    CompChall: Addressing Password Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:739-744 [Conf]
  6. Vipul Goyal
    Fast Digital Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:489-500 [Conf]
  7. Vipul Goyal
    Certificate Revocation Lists or Online Mechanisms. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:261-268 [Conf]
  8. Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
    A new protocol to counter online dictionary attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:2, pp:114-120 [Journal]
  9. Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
    Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:444-459 [Conf]
  10. Vipul Goyal
    Reducing Trust in the PKG in Identity Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:430-447 [Conf]

  11. Black-box accountable authority identity-based encryption. [Citation Graph (, )][DBLP]


  12. Identity-based encryption with efficient revocation. [Citation Graph (, )][DBLP]


  13. Position Based Cryptography. [Citation Graph (, )][DBLP]


  14. Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. [Citation Graph (, )][DBLP]


  15. Password-Authenticated Session-Key Generation on the Internet in the Plain Model. [Citation Graph (, )][DBLP]


  16. New Constructions for UC Secure Computation Using Tamper-Proof Hardware. [Citation Graph (, )][DBLP]


  17. Resettably Secure Computation. [Citation Graph (, )][DBLP]


  18. Efficient Two Party and Multi Party Computation Against Covert Adversaries. [Citation Graph (, )][DBLP]


  19. Certificate Revocation Using Fine Grained Certificate Space Partitioning. [Citation Graph (, )][DBLP]


  20. Covert Multi-Party Computation. [Citation Graph (, )][DBLP]


  21. Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy. [Citation Graph (, )][DBLP]


  22. Bounded Ciphertext Policy Attribute Based Encryption. [Citation Graph (, )][DBLP]


  23. On the round complexity of covert computation. [Citation Graph (, )][DBLP]


  24. Universally Composable Multi-party Computation with an Unreliable Common Reference String. [Citation Graph (, )][DBLP]


  25. Founding Cryptography on Tamper-Proof Hardware Tokens. [Citation Graph (, )][DBLP]


  26. Vcache: Caching Dynamic Documents [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002