


default search action
B. B. Amberker
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]M. H. Abhilash, B. B. Amberker:
Dynamic group signature scheme using ideal lattices. Int. J. Inf. Comput. Secur. 22(1): 60-90 (2023) - 2020
- [j22]Thakkalapally Preethi, Bharat Amberker:
Traceable signatures using lattices. Int. Arab J. Inf. Technol. 17(6): 965-975 (2020) - [j21]Thakkalapally Preethi
, B. B. Amberker:
Lattice-based group signature scheme without random oracle. Inf. Secur. J. A Glob. Perspect. 29(6): 366-381 (2020)
2010 – 2019
- 2017
- [j20]B. R. Purushothama, B. B. Amberker:
Access control mechanisms for outsourced data in public cloud using polynomial interpolation and multilinear map. Int. J. Cloud Comput. 6(1): 1-31 (2017) - 2015
- [j19]B. R. Purushothama, B. B. Amberker:
Provably secure public key cryptosystem with limited number of encryptions for authorised sharing of outsourced data. Int. J. Cloud Comput. 4(4): 317-334 (2015) - [c33]Byrapura Rangappa Purushothama
, B. B. Amberker:
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme. SSCC 2015: 122-133 - 2014
- [j18]Syed Taqi Ali
, B. B. Amberker:
Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model. Int. J. Appl. Cryptogr. 3(2): 148-165 (2014) - [j17]Syed Taqi Ali
, B. B. Amberker:
Attribute-based group signature without random oracles with attribute anonymity. Int. J. Inf. Comput. Secur. 6(2): 109-132 (2014) - [j16]Sagar Gujjunoori, B. B. Amberker:
Reversible Data Embedding for MPEG-4 Video Using Middle Frequency DCT Coefficients. J. Inf. Hiding Multim. Signal Process. 5(3): 408-419 (2014) - 2013
- [j15]A. S. Poornima, B. B. Amberker:
Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 17(3-4): 193-219 (2013) - [j14]A. S. Poornima
, B. B. Amberker:
Key establishment protocols for secure communication in clustered sensor networks. Int. J. Commun. Networks Distributed Syst. 11(2): 120-138 (2013) - [j13]B. R. Purushothama
, B. Shrinath, B. B. Amberker:
Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud. Int. J. Inf. Commun. Technol. 5(2): 167-186 (2013) - [j12]Syed Taqi Ali
, B. B. Amberker:
A dynamic constant size attribute-based group signature scheme with attribute anonymity. Int. J. Inf. Priv. Secur. Integr. 1(4): 312-343 (2013) - [j11]B. R. Purushothama, B. B. Amberker:
Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation. Int. J. Trust. Manag. Comput. Commun. 1(2): 175-198 (2013) - [j10]Sagar Gujjunoori
, B. B. Amberker:
DCT based reversible data embedding for MPEG-4 video using HVS characteristics. J. Inf. Secur. Appl. 18(4): 157-166 (2013) - [j9]B. R. Purushothama
, B. B. Amberker:
Secure group and multi-layer group communication schemes based on polynomial interpolation. Secur. Commun. Networks 6(6): 735-756 (2013) - [c32]B. R. Purushothama
, B. B. Amberker:
Secure group key management scheme based on dual receiver cryptosystem. AsiaPKC@AsiaCCS 2013: 45-50 - [c31]B. R. Purushothama
, B. B. Amberker:
Provable data possession scheme with constant proof size for outsourced data in public cloud. ICACCI 2013: 1662-1667 - [c30]Sagar Gujjunoori, B. B. Amberker:
BUSYEMBED: An HVS based reversible data embedding scheme for video using DCT. ICDP 2013: 1-6 - [c29]Syed Taqi Ali
, B. B. Amberker:
Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard Model. SPACE 2013: 147-171 - [c28]B. R. Purushothama
, B. B. Amberker:
Efficient Hierarchical Key Management Scheme Based on Polynomial Construction. SSCC 2013: 191-202 - [c27]Syed Taqi Ali
, B. B. Amberker:
Short Attribute-Based Group Signature without Random Oracles with Attribute Anonymity. SSCC 2013: 223-235 - [i2]B. R. Purushothama, B. B. Amberker:
On the Security of Group-based Proxy Re-encryption Scheme. IACR Cryptol. ePrint Arch. 2013: 456 (2013) - 2012
- [c26]B. R. Purushothama
, Bharat Amberker:
Access control mechanisms for outsourced data in cloud. COMSNETS 2012: 1-2 - [c25]Sagar Gujjunoori
, B. B. Amberker:
A DCT based reversible data embedding scheme for MPEG-4 video using HVS characteristics. ICVGIP 2012: 74 - [c24]Nagaraj V. Dharwadkar, B. B. Amberker:
Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images. SECRYPT 2012: 15-24 - [c23]B. R. Purushothama
, Bharat Amberker:
Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation. SNDS 2012: 11-22 - [c22]B. R. Purushothama
, Kusuma Shirisha, Bharat Amberker:
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree. SNDS 2012: 135-146 - 2011
- [j8]A. S. Poornima
, B. B. Amberker:
Secure data collection using mobile data collector in clustered wireless sensor networks. IET Wirel. Sens. Syst. 1(2): 85-95 (2011) - [j7]A. S. Poornima
, B. B. Amberker:
PERSEN: power-efficient logical ring based key management for clustered sensor networks. Int. J. Sens. Networks 10(1/2): 94-103 (2011) - [j6]R. Aparna, B. B. Amberker:
An efficient scheme to handle bursty behavior in secure group communication using binomial key trees. Secur. Commun. Networks 4(9): 1027-1043 (2011) - [c21]B. R. Purushothama
, Bharat Amberker:
Group key management scheme for simultaneous multiple groups with overlapped membership. COMSNETS 2011: 1-10 - 2010
- [j5]Nagaraj V. Dharwadkar, B. B. Amberker:
An Efficient and Secured non blind Watermarking Scheme for Color Images using DWT and Arnold transform. Int. J. Comput. 9(2): 183-191 (2010) - [j4]Nagaraj V. Dharwadkar
, B. B. Amberker:
Steganographic Scheme for Gray-Level Image Using Pixel Neighborhood and LSB Substitution. Int. J. Image Graph. 10(4): 589-607 (2010) - [j3]Nagaraj V. Dharwadkar
, B. B. Amberker:
An improved reversible steganography scheme based on dual cover images. Int. J. Multim. Intell. Secur. 1(4): 336-349 (2010) - [j2]R. Aparna, B. B. Amberker:
A key management scheme for secure group communication using binomial key trees. Int. J. Netw. Manag. 20(6): 383-418 (2010) - [c20]A. S. Poornima
, B. B. Amberker, H. S. Likith Raj, S. Naveen Kumar, K. N. Pradeep, S. V. Ravithej:
Secure data collection in Sensor Networks using tree based key management scheme and secret sharing. CISIM 2010: 491-496 - [c19]N. R. Sunitha
, B. B. Amberker:
Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme. CNSA 2010: 270-279 - [c18]Nagaraj V. Dharwadkar
, B. B. Amberker:
Estimating the embedding capacity of a color image using Color Difference. WOCN 2010: 1-5 - [c17]A. S. Poornima
, B. B. Amberker:
SEEDA: Secure end-to-end data aggregation in Wireless Sensor Networks. WOCN 2010: 1-5
2000 – 2009
- 2009
- [j1]R. Aparna, B. B. Amberker:
Analysis of Key Management Schemes for Secure Group Communication and Their Classification. J. Comput. Inf. Technol. 17(2): 203-214 (2009) - [c16]A. S. Poornima
, B. B. Amberker, Harihar Baburao Jadhav:
An energy efficient deterministic key establishment scheme for clustered Wireless Sensor Networks. HiPC 2009: 189-194 - [c15]A. S. Poornima
, B. B. Amberker:
Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks. IC3 2009: 434-444 - [i1]Nagaraj V. Dharwadkar, B. B. Amberker:
Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution. CoRR abs/0912.3923 (2009) - 2008
- [c14]N. R. Sunitha
, B. B. Amberker, Prashant Koulgi:
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme. ACIS-ICIS 2008: 241-246 - [c13]N. R. Sunitha
, B. B. Amberker:
Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy Revocation. IAS 2008: 73-78 - [c12]N. R. Sunitha
, B. B. Amberker:
Forward-Secure Multi-signatures. ICDCIT 2008: 89-99 - [c11]N. R. Sunitha
, B. B. Amberker:
Proxy Re-signature Schemes. ICISS 2008: 156-157 - [c10]A. S. Poornima
, B. B. Amberker:
Tree-based key management scheme for heterogeneous sensor networks. ICON 2008: 1-6 - [c9]N. R. Sunitha
, B. B. Amberker:
A new method of verifying digital signatures in e-cheque processing. ICON 2008: 1-5 - [c8]A. S. Poornima, B. B. Amberker:
A New Approach to Securing Broadcast Data in Sensor Networks. ICYCS 2008: 1998-2001 - [c7]R. Aparna, B. B. Amberker:
Authenticated Secure Group Communication using Broadcast Encryption Key Computation. ITNG 2008: 348-353 - [c6]A. S. Poornima
, B. B. Amberker:
A Secure Group Key Management Scheme for Sensor Networks. ITNG 2008: 744-748 - [c5]A. S. Poornima
, B. B. Amberker:
Distributed Key Management Technique for Reliable Secure Group Communication. ITNG 2008: 1198-1199 - [c4]R. Aparna, B. B. Amberker:
New group key computation technique for secure group communication. PIMRC 2008: 1-5 - [c3]B. B. Amberker, N. R. Sunitha:
Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers. SECRYPT 2008: 245-252 - 2007
- [c2]N. R. Sunitha, B. B. Amberker, Prashant Koulgi:
Controlled Delegation in e-cheques Using Proxy Signatures. EDOC 2007: 414-422 - [c1]N. R. Sunitha
, B. B. Amberker, Prashant Koulgi, P. Siddharth:
Secure e-Cheque Clearance between Financial Institutions. CEC/EEE 2007: 99-106
Coauthor Index
aka: Byrapura Rangappa Purushothama

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint