Protocol composition logic (PCL) A Datta, A Derek, JC Mitchell, A Roy Electronic Notes in Theoretical Computer Science 172, 311-358, 2007 | 301 | 2007 |
Shorter quasi-adaptive NIZK proofs for linear subspaces CS Jutla, A Roy Journal of Cryptology 30 (4), 1116-1156, 2017 | 204 | 2017 |
Function-hiding inner product encryption is practical S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu International Conference on Security and Cryptography for Networks, 544-562, 2018 | 182 | 2018 |
NIST Big Data Interoperability Framework: Volume 2, Big Data Taxonomies WL Chang, N Grady Wo L. Chang, Nancy Grady, 2019 | 120 | 2019 |
Universally composable security analysis of OAuth v2. 0 S Chari, C Jutla, A Roy Cryptology ePrint Archive, 2011 | 88 | 2011 |
Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces CS Jutla, A Roy Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 74 | 2014 |
Secrecy analysis in protocol composition logic A Roy, A Datta, A Derek, JC Mitchell, JP Seifert Advances in Computer Science-ASIAN 2006. Secure Software and Related Issues …, 2007 | 66 | 2007 |
Top ten big data security and privacy challenges AC Mora, Y Chen, A Fuchs, A Lane, R Lu, P Manadhata Cloud Security Alliance 140, 31, 2012 | 50* | 2012 |
NIST Big Data Public Working Group Definitions and Taxonomies Subgroup In: Framework: Definitions NBD Interoperability NIST Special Publication, 1500-1, 2015 | 48* | 2015 |
Big data: Challenges, practices and technologies: NIST big data public working group workshop at IEEE big data 2014 NW Grady, M Underwood, A Roy, WL Chang 2014 IEEE International Conference on Big Data (Big Data), 11-15, 2014 | 37 | 2014 |
Dual-system simulation-soundness with applications to UC-PAKE and more CS Jutla, A Roy Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015 | 36 | 2015 |
Formal proofs of cryptographic security of diffie-hellman-based protocols A Roy, A Datta, JC Mitchell International Symposium on Trustworthy Global Computing, 312-329, 2007 | 35 | 2007 |
Improved (almost) tightly-secure simulation-sound QA-NIZK with applications M Abe, CS Jutla, M Ohkubo, A Roy International Conference on the Theory and Application of Cryptology and …, 2018 | 34 | 2018 |
Improved structure preserving signatures under standard bilinear assumptions CS Jutla, A Roy IACR International Workshop on Public Key Cryptography, 183-209, 2017 | 34 | 2017 |
Big data taxonomy P Murthy, A Bharadwaj, PA Subrahmanyam, A Roy, S Rajan Big Data Working Group, Cloud Security Alliance, 9-29, 2014 | 34* | 2014 |
Relatively-sound NIZKs and password-based key-exchange C Jutla, A Roy International Workshop on Public Key Cryptography, 485-503, 2012 | 34 | 2012 |
Privacy preserving set-based biometric authentication J Hartloff, A Mandal, A Roy US Patent 9,967,101, 2018 | 33 | 2018 |
Compressed quadratization of higher order binary optimization problems A Mandal, A Roy, S Upadhyay, H Ushijima-Mwesigwa Proceedings of the 17th ACM International Conference on Computing Frontiers …, 2020 | 31 | 2020 |
Relational encryption for password verification R Kamakari, T Shimoyama, H Tsuda, Y Yaginuma, A Mandal, A Roy, ... US Patent 10,129,028, 2018 | 30 | 2018 |
Inductive proofs of computational secrecy A Roy, A Datta, A Derek, J Mitchell Computer Security–ESORICS 2007, 219-234, 2007 | 29 | 2007 |