The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Himanshu Khurana: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Himanshu Khurana, Hyung-Seok Hahm
    Certified mailing lists. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:46-58 [Conf]
  2. Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras
    Integrated Security Services for Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:38-40 [Conf]
  3. Himanshu Khurana, Mohammad Maifi Hasan Khan, Von Welch
    Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:115- [Conf]
  4. Himanshu Khurana, Virgil D. Gligor, John Linn
    Reasoning about Joint Administration of Access Policies for Coalition Resources. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:429-0 [Conf]
  5. Himanshu Khurana, Jin Heo, Meenal Pant
    From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:260-281 [Conf]
  6. Himanshu Khurana, Rafael Bonilla, Adam J. Slagell, Raja Afandi, Hyung-Seok Hahm, Jim Basney
    Scalable Group Key Management with Partially Trusted Controllers. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:662-672 [Conf]
  7. Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva
    Administering Access Control in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:249-261 [Conf]
  8. Himanshu Khurana
    Scalable security and accounting services for content-based publish/subscribe systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:801-807 [Conf]
  9. Himanshu Khurana, Adam J. Slagell, Rafael Bonilla
    SELS: a secure e-mail list service. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:306-313 [Conf]
  10. Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras
    On the Negotiation of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:188-201 [Conf]
  11. Himanshu Khurana, Virgil D. Gligor
    Review and Revocation of Access Privileges Distributed with PKI Certificates. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:100-112 [Conf]
  12. Himanshu Khurana, Virgil D. Gligor
    A Model for Access Negotiations in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    WETICE, 2004, pp:205-210 [Conf]
  13. Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana
    Using Attribute-Based Access Control to Enable Attribute-Based Messaging. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:403-413 [Conf]

  14. PBES: a policy based encryption system with application to data sharing in the power grid. [Citation Graph (, )][DBLP]


  15. RRE: A game-theoretic intrusion Response and Recovery Engine. [Citation Graph (, )][DBLP]


  16. Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems. [Citation Graph (, )][DBLP]


  17. Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. [Citation Graph (, )][DBLP]


  18. Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols. [Citation Graph (, )][DBLP]


  19. DLPKH - Distributed Logical Public-Key Hierarchy. [Citation Graph (, )][DBLP]


  20. Time Valid One-Time Signature for Time-Critical Multicast Data Authentication. [Citation Graph (, )][DBLP]


  21. MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming. [Citation Graph (, )][DBLP]


  22. Palantir: a framework for collaborative incident response and investigation. [Citation Graph (, )][DBLP]


  23. Usable secure mailing lists with untrusted servers. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002