Older papers
- Rebalancing in Acyclic Payment Networks
Lalitha M. Subramanian and Guruprasad Eswaraiah and Roopa Vishwanathan
Privacy, Security and Trust (PST) 2019 [pdf].
- Exploring Automation in Proofs of Attribute-based Encryption in the Standard Model
Guruprasad Eswaraiah and Lalitha M. Subramanian and Roopa Vishwanathan
Privacy, Security and Trust (PST) 2019 [pdf].
- Private and Secure Mixing in Credit Networks
Lalitha M. Subramanian and Guruprasad Eswaraiah and Roopa Vishwanathan
ACM Blockchain and Internet of Things Conference (BIOTC) 2019 [pdf].
- Attribute-based Signatures: The Case for Automation
Lalitha M. Subramanian and Roopa Vishwanathan
SECRYPT 2018 [pdf].
- Automated Proofs of Signatures using Bilinear Pairings
Guruprasad Eswaraiah and Roopa Vishwanathan and Douglas Nedza
Privacy, Security and Trust (PST) 2018 [pdf].
- Expiration and Revocation of Keys for Attrbiute-based Signatures
Stephen R. Tate and Roopa Vishwanathan
Data and Application Security and Privacy (DBSec) 2015 [eprint version].
- Encrypted Secret Sharing and Analysis by Plaintext Randomization
Stephen R. Tate and Roopa Vishwanathan and Scott Weeks
Information Security Conference (ISC) 2013 [eprint version].
- Multi-user Dynamic Proofs of Data Possession using Trusted Hardware
Stephen R. Tate and Roopa Vishwanathan, and Lance Everhart
ACM Conference on Data and Application Security and Privacy (CODAPSY) 2013 [pdf].
- General Secure Function Evaluation using Standard Trusted Computing Hardware
Stephen R. Tate and Roopa Vishwanathan
Privacy, Security and Trust (PST) 2011 [pdf].
- Privacy Preserving Group Nearest Neighbor Queries in Location-based Services using Cryptographic Techniques.
Yan Huang and Roopa Vishwanathan
IEEE Globecom 2010 [pdf].
- Performance Evaluation of TPM-based Digital Wallets
Stephen R. Tate and Roopa Vishwanathan
International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) 2010.
- A Two-level Protocol to Answer Private Location-based Queries
Roopa Vishwanathan and Yan Huang
IEEE Intelligence and Security Informatics (ISI) 2009 (Best paper honorable mention) [pdf].
- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology
Stephen R. Tate and Roopa Vishwanathan
IFIP Data and Application Security and Privacy (DBSec) 2009 [pdf].