Follow
Raghav Bhaskar
Raghav Bhaskar
Researcher Cryptography and Privacy
Verified email at csiro.au
Title
Cited by
Cited by
Year
Discovering frequent patterns in sensitive data
R Bhaskar, S Laxman, A Smith, A Thakurta
Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010
3082010
Noiseless database privacy
R Bhaskar, A Bhowmick, V Goyal, S Laxman, A Thakurta
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
1152011
Cerium doped heavy metal fluoride glasses, a possible alternative for electromagnetic calorimetry
E Auffray, D Bouttet, I Dafinei, J Fay, P Lecoq, JA Mares, M Martini, ...
Nuclear Instruments and Methods in Physics Research Section A: Accelerators …, 1996
781996
Improved bounds on security reductions for discrete log based signatures
S Garg, R Bhaskar, SV Lokam
Annual International Cryptology Conference, 93-107, 2008
692008
Techniques for representing keywords in an encrypted search index to prevent histogram-based attacks
SV Lokam, A Manchepalli, B Ashok, SP Karanth, R Bhaskar
US Patent 8,819,451, 2014
612014
Transparent virtual currency using verifiable tokens
S Guha, R Bhaskar, S Laxman, P Naldurg
US Patent App. 13/159,224, 2012
582012
An efficient group key agreement protocol for ad hoc networks
D Augot, R Bhaskar, V Issarny, D Sacchetti
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
472005
An efficient group key agreement protocol for ad hoc networks
D Augot, R Bhaskar, V Issarny, D Sacchetti
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
472005
User friendly two factor authentication
R Bhaskar, K Sharma
US Patent App. 15/740,648, 2018
432018
Efficient Galois field arithmetic on SIMD architectures
R Bhaskar, PK Dubey, V Kumar, A Rudra
Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and …, 2003
402003
On the (in) feasibility of attribute inference attacks on machine learning models
BZH Zhao, A Agrawal, C Coburn, HJ Asghar, R Bhaskar, MA Kaafar, ...
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 232-251, 2021
352021
Efficient authentication for reactive routing protocols
R Bhaskar, J Herranz, F Laguillaumie
20th International Conference on Advanced Information Networking and …, 2006
302006
Aggregate designated verifier signatures and application to secure routing
R Bhaskar, J Herranz, F Laguillaumie
International Journal of Security and Networks 2 (3-4), 192-201, 2007
282007
A three round authenticated group key agreement protocol for ad hoc networks
D Augot, R Bhaskar, V Issarny, D Sacchetti
Pervasive and Mobile Computing 3 (1), 36-52, 2007
272007
Non observability in the random oracle model
P Ananth, R Bhaskar
International Conference on Provable Security, 86-103, 2013
202013
Group key agreement in ad hoc networks
R Bhaskar
INRIA, 2003
192003
Data level privacy preserving: A stochastic perturbation approach based on differential privacy
C Ma, L Yuan, L Han, M Ding, R Bhaskar, J Li
IEEE Transactions on Knowledge and Data Engineering 35 (4), 3619-3631, 2021
132021
On inferring training data attributes in machine learning models
BZH Zhao, HJ Asghar, R Bhaskar, MA Kaafar
arXiv preprint arXiv:1908.10558, 2019
132019
Verito: A Practical System for Transparency and Accountability in Virtual Economies.
R Bhaskar, S Guha, S Laxman, P Naldurg
NDSS, 2013
132013
Agdh (asymmetric group diffie hellman) an efficient and dynamic group key agreement protocol for ad hoc networks
R Bhaskar, D Augot, C Adjih, P Mühlethaler, S Boudjit
New Technologies, Mobility and Security, 633-633, 2007
112007
The system can't perform the operation now. Try again later.
Articles 1–20