Retricoin: Bitcoin Based on Compact Proofs of Retrievability B Sengupta, S Bag, S Ruj, K Sakurai International Conference on Distributed Computing and Networking (ICDCN), 14, 2016 | 50 | 2016 |
Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage B Sengupta, S Ruj IEEE Transactions on Cloud Computing 8 (1), 138-151, 2020 | 31 | 2020 |
Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques B Sengupta, A Dixit, S Ruj IEEE Transactions on Cloud Computing 10 (3), 2090-2101, 2022 | 20 | 2022 |
Privacy-Preserving Network Path Validation B Sengupta, Y Li, K Bu, RH Deng ACM Transactions on Internet Technology 20 (1), 5:1-5:27, 2020 | 16 | 2020 |
Certificate Transparency with Enhancements and Short Proofs A Singh, B Sengupta, S Ruj Australasian Conference on Information Security and Privacy, 381-389, 2017 | 16 | 2017 |
PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication Y Tian, Y Li, X Liu, RH Deng, B Sengupta IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018 | 15 | 2018 |
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms B Sengupta, A Das Applied Mathematics and Computation 293, 204-217, 2017 | 15 | 2017 |
DistriTrust: Distributed and Low-Latency Access Validation in Zero-Trust Architecture B Sengupta, A Lakshminarayanan Journal of Information Security and Applications 63, 103023:1-103023:12, 2021 | 13 | 2021 |
Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding B Sengupta, S Ruj ACM Asia Conference on Computer and Communications Security (AsiaCCS), 107-118, 2016 | 12 | 2016 |
Leakage-Resilient Biometric-Based Remote User Authentication with Fuzzy Extractors Y Tian, Y Li, B Sengupta, N Li, C Su Theoretical Computer Science 814, 223-233, 2020 | 7 | 2020 |
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature Y Tian, Y Li, RH Deng, B Sengupta, G Yang Journal of Computer Security 29 (3), 273-298, 2021 | 5 | 2021 |
Privacy-Preserving Biometric-Based Remote User Authentication Y Tian, Y Li, X Liu, RH Deng, B Sengupta Journal of Internet Technology 20 (7), 2265-2276, 2019 | 5 | 2019 |
Keyword-Based Delegable Proofs of Storage B Sengupta, S Ruj International Conference on Information Security Practice and Experience …, 2018 | 4 | 2018 |
Editing-Enabled Signatures: A New Tool for Editing Authenticated Data B Sengupta, Y Li, Y Tian, RH Deng IEEE Internet of Things Journal 7 (6), 4997-5007, 2020 | 3 | 2020 |
An Efficient Secure Distributed Cloud Storage for Append-only Data B Sengupta, N Nikam, S Ruj, S Narayanamurthy, S Nandi IEEE International Conference on Cloud Computing (CLOUD), 146-153, 2018 | 3 | 2018 |
VALNET: Privacy-Preserving Multi-Path Validation B Sengupta Computer Networks 204, 108695:1-108695:14, 2022 | 2 | 2022 |
Privacy-preserving remote user authentication with k-times untraceability Y Tian, Y Li, B Sengupta, RH Deng, A Ching, W Liu International Conference on Information Security and Cryptology (Inscrypt …, 2019 | 2 | 2019 |
SIMD-Based Implementations of Sieving in Integer-Factoring Algorithms B Sengupta, A Das International Conference on Security, Privacy, and Applied Cryptography …, 2013 | 2 | 2013 |
Cloud Data Auditing Using Proofs of Retrievability B Sengupta, S Ruj Guide to Security Assurance for Cloud Computing, 193-210, 2015 | 1 | 2015 |
Message Control for Blockchain Rewriting Y Li, B Sengupta, Y Tian, J Yuan, TH Yuen IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |