What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jaideep Vaidya
Google Scholar
32
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Performance analysis of dynamic ABAC systems using a queuing theoretic framework.
Gaurav Madkaikar
Karthikeya S. M. Yelisetty
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2024
conf/ccs
WPES '24: 23rd Workshop on Privacy in the Electronic Society (WPES).
Erman Ayday
Jaideep Vaidya
2024
conf/sec
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems.
Gaurav Madkaikar
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2022
journals/popets
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies.
Anisa Halimi
Leonard Dervishi
Erman Ayday
Apostolos Pyrgelis
Juan Ramón Troncoso-Pastoriza
Jean-Pierre Hubaux
Xiaoqian Jiang
Jaideep Vaidya
2022
conf/sec
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain.
Amshumaan Pericherla
Proteet Paul
Shamik Sural
Jaideep Vaidya
Vijay Atluri
2022
conf/asiaccs
Enabling Attribute-Based Access Control in Linux Kernel.
H. O. Sai Varshith
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2020
journals/compsec
Efficient determination of equivalence for encrypted data.
Jason N. Doctor
Jaideep Vaidya
Xiaoqian Jiang
Shuang Wang
Lisa M. Schilling
Toan Ong
Michael E. Matheny
Lucila Ohno-Machado
Daniella Meeker
2020
conf/iciss
Privacy-Preserving Friend Recommendation in an Integrated Social Environment.
Nitish M. Uplavikar
Jaideep Vaidya
Dan Lin
Wei Jiang
2019
journals/compsec
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database.
Mahendra Pratap Singh
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2019
conf/ccs
How to Accurately and Privately Identify Anomalies.
Hafiz Salman Asif
Periklis A. Papakonstantinou
Jaideep Vaidya
2019
conf/iciss
VisMAP: Visual Mining of Attribute-Based Access Control Policies.
Saptarshi Das
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
Gerhard Rigoll
2019
conf/iciss
Policy Reconciliation and Migration in Attribute Based Access Control.
Gunjan Batra
Vijayalakshmi Atluri
Jaideep Vaidya
Shamik Sural
2018
journals/tifs
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
Sadhana Jha
Shamik Sural
Vijayalakshmi Atluri
Jaideep Vaidya
2017
conf/sec
Evaluating the Privacy Implications of Frequent Itemset Disclosure.
Edoardo Serra
Jaideep Vaidya
Haritha Akella
Ashish Sharma
2017
conf/sec
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart.
David Lorenzi
Jaideep Vaidya
Achyuta Aich
Shamik Sural
Vijayalakshmi Atluri
Joseph Calca
2017
conf/sec
Secure and Efficient k-NN Queries.
Hafiz Salman Asif
Jaideep Vaidya
Basit Shafiq
Nabil R. Adam
2016
journals/compsec
Mining temporal roles using many-valued concepts.
Barsha Mitra
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2015
conf/ccs
Practical Private One-way Anonymous Message Routing.
Anirban Basu
Juan Camilo Corena
Jaideep Vaidya
Jon Crowcroft
Shinsaku Kiyomoto
Yung Shin Van Der Sype
Yutaka Miyake
2015
conf/sec
Enhancing the Security of Image CAPTCHAs Through Noise Addition.
David Lorenzi
Emre Uzun
Jaideep Vaidya
Shamik Sural
Vijayalakshmi Atluri
2015
conf/iciss
Role Mining in the Presence of Separation of Duty Constraints.
Prasuna Sarana
Arindam Roy
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2015
conf/iciss
Enforcing Separation of Duty in Attribute Based Access Control Systems.
Sadhana Jha
Shamik Sural
Vijayalakshmi Atluri
Jaideep Vaidya
2014
journals/compsec
Security analysis of temporal RBAC under an administrative model.
Sadhana Jha
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2014
conf/iciss
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Sadhana Jha
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2013
journals/compsec
AMTRAC: An administrative model for temporal role-based access control.
Manisha Sharma
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2013
conf/iciss
Web Services Based Attacks against Image CAPTCHAs.
David Lorenzi
Jaideep Vaidya
Shamik Sural
Vijayalakshmi Atluri
2013
conf/iciss
An Administrative Model for Spatio-Temporal Role Based Access Control.
Manisha Sharma
Shamik Sural
Vijayalakshmi Atluri
Jaideep Vaidya
2012
conf/sec
Role Mining under Role-Usage Cardinality Constraint.
John C. John
Shamik Sural
Vijayalakshmi Atluri
Jaideep Vaidya
2012
conf/iciss
Attacking Image Based CAPTCHAs Using Image Recognition Techniques.
David Lorenzi
Jaideep Vaidya
Emre Uzun
Shamik Sural
Vijayalakshmi Atluri
2010
journals/compsec
Anonymization models for directional location based service environments.
Heechang Shin
Jaideep Vaidya
Vijayalakshmi Atluri
2010
conf/iwsec
Automating Security Configuration and Administration: An Access Control Perspective.
Jaideep Vaidya
2008
conf/acsac
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies.
Qi Guo
Jaideep Vaidya
Vijayalakshmi Atluri
2006
conf/ccs
RoleMiner: mining roles using subset enumeration.
Jaideep Vaidya
Vijayalakshmi Atluri
Janice Warner
Coauthors
Achyuta Aich
(1)
Amshumaan Pericherla
(1)
Anirban Basu
(1)
Anisa Halimi
(1)
Apostolos Pyrgelis
(1)
Arindam Roy
(1)
Ashish Sharma
(1)
Barsha Mitra
(1)
Basit Shafiq
(1)
Dan Lin
(1)
Daniella Meeker
(1)
David Lorenzi
(4)
Edoardo Serra
(1)
Emre Uzun
(2)
Erman Ayday
(2)
Gaurav Madkaikar
(2)
Gerhard Rigoll
(1)
Gunjan Batra
(1)
H. O. Sai Varshith
(1)
Hafiz Salman Asif
(2)
Haritha Akella
(1)
Heechang Shin
(1)
Jaideep Vaidya
(32)
Janice Warner
(1)
Jason N. Doctor
(1)
Jean-Pierre Hubaux
(1)
John C. John
(1)
Jon Crowcroft
(1)
Joseph Calca
(1)
Juan Camilo Corena
(1)
Juan Ramón Troncoso-Pastoriza
(1)
Karthikeya S. M. Yelisetty
(1)
Leonard Dervishi
(1)
Lisa M. Schilling
(1)
Lucila Ohno-Machado
(1)
Mahendra Pratap Singh
(1)
Manisha Sharma
(2)
Michael E. Matheny
(1)
Nabil R. Adam
(1)
Nitish M. Uplavikar
(1)
Periklis A. Papakonstantinou
(1)
Prasuna Sarana
(1)
Proteet Paul
(1)
Qi Guo
(1)
Sadhana Jha
(4)
Saptarshi Das
(1)
Shamik Sural
(20)
Shinsaku Kiyomoto
(1)
Shuang Wang
(1)
Toan Ong
(1)
Vijay Atluri
(1)
Vijayalakshmi Atluri
(22)
Wei Jiang
(1)
Xiaoqian Jiang
(2)
Yung Shin Van Der Sype
(1)
Yutaka Miyake
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to