default search action
Gaurav Sharma 0006
Person information
- affiliation: Université libre de Bruxelles, Brussels, Belgium
- affiliation (former): Galgotias University, School of Computing Science & Engineering
- affiliation (former): Thapar University, Computer Science and Engineering Department
Other persons with the same name
- Gaurav Sharma — disambiguation page
- Gaurav Sharma 0001 — University of Rochester, Department of Electrical and Computer Engineering, NY, USA (and 2 more)
- Gaurav Sharma 0002 — D. E. Shaw & Co., New York (and 2 more)
- Gaurav Sharma 0003 — Northeastern University Boston, Department of Mechanical and Industrial Engineering
- Gaurav Sharma 0004 — Max Planck Institute for Informatics (MPII), Saarbrücken, Germany (and 4 more)
- Gaurav Sharma 0005 — Texas A&M University, Department of Electrical and Computer Engineering
- Gaurav Sharma 0007 — Battelle Memorial Institute, Medical Devices and Neuromodulation Group, Columbus, OH, USA
- Gaurav Sharma 0008 — Malaviya National Institute of Technology Jaipur, India
- Gaurav Sharma 0009 — Lakehead University, Department of Computer Science, DATALab, Thunder Bay, ON, Canada
- Gaurav Sharma 0010 — CVR College of Engineering, Department of ECE, Hyderabad, India (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c19]Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma:
Lattice-Based Inner Product Argument. AFRICACRYPT 2022: 236-268 - 2021
- [j16]Gaurav Sharma, Georgios Bousdras, Soultana Ellinidou, Olivier Markowitch, Jean-Michel Dricot, Dragomir Milojevic:
Exploring the security landscape: NoC-based MPSoC to Cloud-of-Chips. Microprocess. Microsystems 84: 103963 (2021) - [c18]Gaurav Sharma, Denis Verstraeten, Vishal Saraswat, Jean-Michel Dricot, Olivier Markowitch:
Anonymous Fair Auction on Blockchain. NTMS 2021: 1-5 - 2020
- [j15]Tarunpreet Bhatia, A. K. Verma, Gaurav Sharma:
Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing. Concurr. Comput. Pract. Exp. 32(5) (2020) - [c17]Soultana Ellinidou, Gaurav Sharma, Olivier Markowitch, Guy Gogniat, Jean-Michel Dricot:
A novel Network-on-Chip security algorithm for tolerating Byzantine faults. DFT 2020: 1-6 - [c16]Soultana Ellinidou, Gaurav Sharma, Olivier Markowitch, Jean-Michel Dricot, Guy Gogniat:
Towards NoC Protection of HT-Greyhole Attack. ICA3PP (3) 2020: 309-323
2010 – 2019
- 2019
- [j14]Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Suman Bala, Olivier Markowitch, Jean-Michel Dricot:
A twofold group key agreement protocol for NoC-based MPSoCs. Trans. Emerg. Telecommun. Technol. 30(6) (2019) - [j13]Pankaj Kumar Sa, Vishnu Sharma, Gaurav Sharma, Tarunpreet Bhatia:
An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps. Int. J. Inf. Secur. Priv. 13(4): 89-108 (2019) - [j12]Vishal Saraswat, Rajeev Anand Sahu, Gaurav Sharma, Veronika Kuchta, Olivier Markowitch:
Public-Key Encryption with Integrated Keyword Search. J. Hardw. Syst. Secur. 3(1): 12-25 (2019) - [j11]Soultana Ellinidou, Gaurav Sharma, Théo Rigas, Tristan Vanspouwen, Olivier Markowitch, Jean-Michel Dricot:
SSPSoC: A Secure SDN-Based Protocol over MPSoC. Secur. Commun. Networks 2019: 4869167:1-4869167:11 (2019) - [j10]Suman Bala, Gaurav Sharma, Himani Bansal, Tarunpreet Bhatia:
On the Security of Authenticated Group Key Agreement Protocols. Scalable Comput. Pract. Exp. 20(1): 93-99 (2019) - [c15]Soultana Ellinidou, Gaurav Sharma, Sotirios Kontogiannis, Olivier Markowitch, Jean-Michel Dricot, Guy Gogniat:
MicroLET: A New SDNoC-Based Communication Protocol for ChipLET-Based Systems. DSD 2019: 61-68 - [c14]Gaurav Sharma, Soultana Ellinidou, Tristan Vanspouwen, Théo Rigas, Jean-Michel Dricot, Olivier Markowitch:
Identity-based TLS for Cloud of Chips. ICISSP 2019: 44-54 - 2018
- [j9]Tarunpreet Bhatia, A. K. Verma, Gaurav Sharma:
Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud. Trans. Emerg. Telecommun. Technol. 29(6) (2018) - [j8]Suman Bala, Gaurav Sharma, Anil K. Verma:
Impersonation attack on CertificateLess key agreement protocol. Int. J. Ad Hoc Ubiquitous Comput. 27(2): 108-120 (2018) - [c13]François Gérard, Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma, Olivier Markowitch:
Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage. ICETE (2) 2018: 207-218 - [c12]Veronika Kuchta, Rajeev Anand Sahu, Vishal Saraswat, Gaurav Sharma, Neetu Sharma, Olivier Markowitch:
Anonymous yet Traceable Strong Designated Verifier Signature. ISC 2018: 403-421 - [c11]Gaurav Sharma, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Olivier Markowitch, Jean-Michel Dricot:
A Twofold Group Key Agreement Protocol for NoC based MPSoCs. PST 2018: 1-2 - [c10]Soultana Ellinidou, Gaurav Sharma, Jean-Michel Dricot, Olivier Markowitch:
A SDN solution for system-on-chip world. SDS 2018: 14-19 - [c9]Gaurav Sharma, Soultana Ellinidou, Veronika Kuchta, Rajeev Anand Sahu, Olivier Markowitch, Jean-Michel Dricot:
Secure Communication on NoC Based MPSoC. SecureComm (2) 2018: 417-428 - 2017
- [j7]Arzoo Miglani, Tarunpreet Bhatia, Gaurav Sharma, Gulshan Shrivastava:
An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor Networks. Scalable Comput. Pract. Exp. 18(3): 207-218 (2017) - [j6]Gaurav Sharma, Suman Bala, Anil K. Verma:
PF-IBS: Pairing-Free Identity Based Digital Signature Algorithm for Wireless Sensor Networks. Wirel. Pers. Commun. 97(1): 1185-1196 (2017) - [c8]Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala:
Authenticated Group Key Agreement Protocol Without Pairing. ICICS 2017: 606-618 - [c7]Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch:
Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings. ICISC 2017: 71-92 - [c6]Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma, Olivier Markowitch:
On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices. ICISC 2017: 284-309 - [c5]Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Olivier Markowitch:
Generic Framework for Attribute-Based Group Signature. ISPEC 2017: 814-834 - [c4]Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Tarunpreet Bhatia, Olivier Markowitch:
Secure Certificateless Proxy Re-encryption Without Pairing. IWSEC 2017: 85-101 - 2016
- [j5]Gaurav Sharma, Suman Bala, Anil K. Verma:
An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks. Int. J. Netw. Secur. 18(1): 82-89 (2016) - [j4]Murari Mandal, Gaurav Sharma, Anil K. Verma:
A Computational Review of Identity-based Signcryption Schemes. Int. J. Netw. Secur. 18(5): 969-977 (2016) - [j3]Suman Bala, Gaurav Sharma, Anil K. Verma:
PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks. Wirel. Pers. Commun. 87(3): 995-1012 (2016) - 2015
- [j2]Gaurav Sharma, Suman Bala, Anil K. Verma:
Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks. Wirel. Pers. Commun. 84(2): 1469-1485 (2015) - 2013
- [j1]Gaurav Sharma, Suman Bala, Anil Kumar Verma:
On the Security of Certificateless Signature Schemes. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [c3]Suman Bala, Gaurav Sharma, Anil K. Verma:
A survey and taxonomy of symmetric key management schemes for wireless sensor networks. CUBE 2012: 585-592 - [c2]Suman Bala, Gaurav Sharma, Anil K. Verma:
An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks. ICITCS 2012: 141-149 - [c1]Gaurav Sharma, Suman Bala, Anil K. Verma:
An Identity-Based Ring Signcryption Scheme. ICITCS 2012: 151-157
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-18 19:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint