Improved Detection Performance of Energy Detection based Spectrum Sensing in Cognitive Radio Networks

Vunnava Aswini , Ashutosh Saxxena , Chilakala Sudhamani
International Journal of Sensors, Wireless Communications and Control 11

2021
A Survey on ID-Based Cryptographic Primitives.

M. Choudary Gorantla , Raju Gangishetti , Ashutosh Saxena
IACR Cryptology ePrint Archive 2005 94

43
2005
HEMIN: A Cryptographic Approach for Private k-NN Classification.

Pradeep Kumar , Meena Dilip Singh , Ashutosh Saxena ,
DMIN 500 -505

5
2008
Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach

Deepak B. Phatak , Ashutosh Saxena , Debabrata Nayak
International Journal of Network Security 7 1 -14

6
2008
Quantum cryptographic protocols for secure comunication

N. L. Gupta , Ashutosh Saxena , D. R. Mehrotra
INFOCOMP Journal of Computer Science; Vol 8, No 1 (2009): March, 2009; 65-74

6
2015
Software licensing control via mobile devices

Harigopal K. B. Ponnapalli , Ashutosh Saxena

18
2008
METHODS FOR DEFENDING STATIC AND DYNAMIC REVERSE ENGINEERING OF SOFTWARE LICENSE CONTROL AND DEVICES THEREOF

Harigopal K. B. Ponnapalli , Ravi Sankar Veerubhotla , Ashutosh Saxena

2
2015
Security Analysis of Lal and Awasthi's Proxy Signature Schemes.

Ved Prakash Gulati , Manik Lal Das , Ashutosh Saxena
IACR Cryptology ePrint Archive 2003 263

4
2003
Cryptanalysis of recently proposed Remote User Authentication Schemes.

Manik Lal Das , Ashutosh Saxena , Atul Negi , Thulasi Goriparthi
IACR Cryptology ePrint Archive 2006 28

45
2006
Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems.

K Phani Kumar , G Shailaja , Ashutosh Saxena ,
IACR Cryptology ePrint Archive 2006 245

8
2006
ID-based Serial Multisignature Scheme using Bilinear Pairings

M. Choudary Gorantla , Raju Gangishetti , Ved Prakash Gulati , Manik Lal Das
international workshop on security 40 -47

2005
Pairing based Mutual Authentication Scheme Using Smart Cards.

G Shailaja , K Phani Kumar , Ashutosh Saxena ,
IACR Cryptology ePrint Archive 2006 152

3
2006
Verifiably Encrypted Signature Scheme with Threshold Adjudication.

M. Choudary Gorantla , Ashutosh Saxena
IACR Cryptology ePrint Archive 2006 343

3
2006
Energy‐efficient reporting scheme for cognitive radio networks

Sudhamani Chilakala , Ashutosh Saxena , Aswini Vunnava ,
iet networks 10 ( 3) 110 -117

2021
Hierarchical key management scheme using polynomial interpolation

Manik Lal Das , Ashutosh Saxena , Ved P. Gulati , Deepak B. Phatak
ACM SIGOPS Operating Systems Review 39 ( 1) 40 -47

46
2005
A novel remote user authentication scheme using bilinear pairings

Manik Lal Das , Ashutosh Saxena , Ved P. Gulati , Deepak B. Phatak
Computers & Security 25 ( 3) 184 -189

118
2006
Machine Learning Approach for Analysing Encrypted Data

K V Pradeepthi , Vikas Tiwari , Ashutosh Saxena
international conference on advanced computing

2018
A DRM framework towards preventing digital piracy

Ravi Sankar Veerubhotla , Ashutosh Saxena
information assurance and security 1 -6

10
2011
A security analysis of smartphone data flow and feasible solutions for lawful interception

Mithun Paul , Nitin Singh Chauhan , Ashutosh Saxena
information assurance and security 19 -24

4
2011
Application security code analysis: a step towards software assurance

Sanjay Rawat , Ashutosh Saxena
International Journal of Information and Computer Security 3 ( 1) 86 -110

4
2009