default search action
Amitabh Saxena
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c22]Alexander Chepurnoy, Amitabh Saxena:
Zerojoin: Combining Zerocoin and CoinJoin. DPM/CBT@ESORICS 2020: 421-436 - [c21]Alexander Chepurnoy, Amitabh Saxena:
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts. Financial Cryptography Workshops 2020: 423-435 - [i13]Alexander Chepurnoy, Amitabh Saxena:
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts. IACR Cryptol. ePrint Arch. 2020: 44 (2020) - [i12]Alexander Chepurnoy, Amitabh Saxena:
ZeroJoin: Combining ZeroCoin and CoinJoin. IACR Cryptol. ePrint Arch. 2020: 560 (2020)
2010 – 2019
- 2019
- [c20]Alexander Chepurnoy, Amitabh Saxena:
Multi-stage Contracts in the UTXO Model. DPM/CBT@ESORICS 2019: 244-254 - 2016
- [c19]Vikrant Kaulgud, Amitabh Saxena, Sanjay Podder, Vibhu Saujanya Sharma, Chethana Dinakar:
Shifting testing beyond the deployment boundary. CSED@ICSE 2016: 30-33 - [c18]Amitabh Saxena, Pradeepkumar Duraisamy Soundrapandian, Vibhu Saujanya Sharma, Vikrant S. Kaulgud:
JDQL: A framework for Java Static Analysis. ISEC 2016: 136-140 - 2015
- [c17]Shubhashis Sengupta, K. M. Annervaz, Amitabh Saxena, Sanjoy Paul:
Data Vaporizer - Towards a Configurable Enterprise Data Storage Framework in Public Cloud. CLOUD 2015: 73-80 - [c16]Amitabh Saxena, Vikrant S. Kaulgud, Vibhu Saujanya Sharma:
Application Layer Encryption for Cloud. APSEC 2015: 377-384 - 2014
- [c15]Amitabh Saxena, Janardan Misra, Aritra Dhar:
Increasing Anonymity in Bitcoin. Financial Cryptography Workshops 2014: 122-139 - 2013
- [c14]Amitabh Saxena, Shubhashis Sengupta, Pradeepkumar Duraisamy, Vikrant S. Kaulgud, Amit Chakraborty:
Detecting SOQL-injection vulnerabilities in SalesForce applications. ICACCI 2013: 489-493 - 2010
- [c13]Amitabh Saxena, Ben Soh:
A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks. Communications and Multimedia Security 2010: 4-15 - [c12]Octavian Catrina, Amitabh Saxena:
Secure Computation with Fixed-Point Numbers. Financial Cryptography 2010: 35-50
2000 – 2009
- 2009
- [j3]Amitabh Saxena, Ben Soh:
A cryptographic primitive based on hidden-order groups. J. Math. Cryptol. 3(2): 89-132 (2009) - [c11]Amitabh Saxena, Brecht Wyseur, Bart Preneel:
Towards Security Notions for White-Box Cryptography. ISC 2009: 49-58 - [c10]Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. SEC 2009: 342-352 - [i11]Amitabh Saxena:
A Secure Wireless Routing Protocol Using Enhanced Chain Signatures. CoRR abs/0907.4085 (2009) - 2008
- [j2]Amitabh Saxena, Ben Soh:
One-Way Signature Chaining: a new paradigm for group cryptosystems. Int. J. Inf. Comput. Secur. 2(3): 268-296 (2008) - [j1]Lane A. Hemaspaandra, Jörg Rothe, Amitabh Saxena:
Enforcing and defying associativity, commutativity, totality, and strong noninvertibility for worst-case one-way functions. Theor. Comput. Sci. 401(1-3): 27-35 (2008) - [i10]Amitabh Saxena, Brecht Wyseur:
On White-box Cryptography and Obfuscation. CoRR abs/0805.4648 (2008) - [i9]Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. IACR Cryptol. ePrint Arch. 2008: 87 (2008) - [i8]Amitabh Saxena, Brecht Wyseur, Bart Preneel:
White-Box Cryptography: Formal Notions and (Im)possibility Results. IACR Cryptol. ePrint Arch. 2008: 273 (2008) - 2007
- [c9]Amitabh Saxena:
Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs. SECRYPT 2007: 239-244 - 2006
- [c8]Amitabh Saxena, Ben Soh:
Pairing Based Cryptography For Distributed And Grid Computing. ICC 2006: 2335-2339 - [i7]Amitabh Saxena, Ben Soh:
A New Cryptosystem Based On Hidden Order Groups. CoRR abs/cs/0605003 (2006) - [i6]Amitabh Saxena, Ben Soh:
A New Cryptosystem Based On Hidden Order Groups. IACR Cryptol. ePrint Arch. 2006: 178 (2006) - 2005
- [c7]Amitabh Saxena, Ben Soh:
Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties. EEE 2005: 282-285 - [c6]Amitabh Saxena, Ben Soh, Dimitri Zantidis:
A Digital Cash Protocol Based on Additive Zero Knowledge. ICCSA (3) 2005: 672-680 - [c5]Amitabh Saxena, Ben Soh:
Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet. ICITA (2) 2005: 460-464 - [c4]Lane A. Hemaspaandra, Jörg Rothe, Amitabh Saxena:
Enforcing and Defying Associativity, Commutativity, Totality, and Strong Noninvertibility for One-Way Functions in Complexity Theory. ICTCS 2005: 265-279 - [c3]Amitabh Saxena, Ben Soh:
A novel method for authenticating mobile agents with one-way signature chaining. ISADS 2005: 187-193 - [i5]Lane A. Hemaspaandra, Jörg Rothe, Amitabh Saxena:
Enforcing and Defying Associativity, Commutativity, Totality, and Strong Noninvertibility for One-Way Functions in Complexity Theory. CoRR abs/cs/0503049 (2005) - [i4]Amitabh Saxena, Ben Soh:
An Authentication Protocol For Mobile Agents Using Bilinear Pairings. IACR Cryptol. ePrint Arch. 2005: 272 (2005) - [i3]Amitabh Saxena, Ben Soh:
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems. IACR Cryptol. ePrint Arch. 2005: 335 (2005) - [i2]Amitabh Saxena, Serguey Priymak, Ben Soh:
Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings. IACR Cryptol. ePrint Arch. 2005: 343 (2005) - [i1]Amitabh Saxena:
Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs. IACR Cryptol. ePrint Arch. 2005: 364 (2005) - 2003
- [c2]Amitabh Saxena, Ben Soh:
A new paradigm for group cryptosystems using quick keys. ICON 2003: 385-389 - [c1]Amitabh Saxena, Ben Soh:
Contributory approaches to centralized key agreement in dynamic peer groups. ICON 2003: 397-402
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint