Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Land use land cover classification of Orissa using multi-temporal IRS-P6 awifs data: A decision tree approach., and . Int. J. Appl. Earth Obs. Geoinformation, 10 (2): 186-193 (2008)Light Weight Write Mechanism for Cloud Data., , , , , , and . IEEE Trans. Parallel Distributed Syst., 29 (5): 1131-1146 (2018)Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency., , , and . ICISS, volume 12553 of Lecture Notes in Computer Science, page 169-184. Springer, (2020)Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model., , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 169-191. Springer, (2021)Lattice-Based IBE with Equality Test in Standard Model., , , and . ProvSec, volume 11821 of Lecture Notes in Computer Science, page 19-40. Springer, (2019)On the Robustness of Visual Cryptographic Schemes., , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 251-262. (2016)An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency., , , , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 47-58. Springer, (2014)Lattice-based Signcryption with Equality Test in Standard Model., , , , , and . CoRR, (2020)Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model., , , and . CoRR, (2020)On unconditionally binding code-based commitment schemes., , and . IMCOM, page 101. ACM, (2017)