| |
2025 |
S. Kumari and H. Tewari |
Implementation of Privacy-Preserving Identifiers for the Secure Storage of Electronic Health Records on the Ethereum Blockchain ACM Distributed Ledger Technologies. DOI: https://doi.org/10.1145/3743695 |
| |
2025 |
A. Lele, V. Agarwal and H. Tewari |
From Theory to Implementation of Quantum-Safe Ledgers with XRPL as a Case Study The 7th International Conference on Blockchain Computing and Applications (BCCA), pp145-152. DOI: https://doi.org/10.1109/BCCA66705.2025.11229538 |
| |
2025 |
V. Agarwal, H. Vardhan, A. Kumar and H. Tewari |
PoW++: An Energy Efficient Proof-of-Work Variant The 7th International Conference on Blockchain Computing and Applications (BCCA), pp98-105. DOI: https://doi.org/10.1109/BCCA66705.2025.11229519 |
| |
2025 |
Y. Yang, J. Li, G. Xie, X. Zhang, J. Xu, T. Gao and H Tewari |
Shifting Decision Boundary Against Adversarial Semantic Attacks in Latent Diffusion Models Information Fusion, 125(103463). DOI: https://doi.org/10.1016/j.inffus.2025.103463 |
| |
2025 |
H. Vardhan, P. Hiranayachatri, A. Lele and H. Tewari |
A Blockchain-Native PKI: Secure X.509 Certificate Management on the XRP Ledger 1st IEEE International Conference on Distributed Ledger Technologies (IEEE ICDLT) |
| |
2025 |
S. Chen, V. Agarwal and H. Tewari |
CarbonChainRL - A Blockchain Oracle-Based Reinforcement Learning System for Dynamic Carbon Trading Markets 1st IEEE International Conference on Distributed Ledger Technologies (IEEE ICDLT) |
| |
2025 |
S. Chen, V. Agarwal, A. Lele and H. Tewari |
CarbonChainRL - A Blockchain Oracle-Based Reinforcement Learning System for Dynamic Carbon Trading Markets 1st IEEE International Conference on Distributed Ledger Technologies (IEEE ICDLT) |
| |
2025 |
A. Lele and H. Tewari |
The Zcash Protocol Explained: A Journey into Privacy-Preserving Cryptography 1st IEEE International Conference on Distributed Ledger Technologies (IEEE ICDLT) |
| |
2025 |
W. Lin, A. Lele. H. Vardhan and H.Tewari |
From Transparent to Confidential Transactions - Zero Knowledge Proofs on the XRP Ledger Blockchain Kaigi 2025 (BCK25) |
| |
2025 |
S. Kumari H. Dutta and H. Tewari |
Securing User Identity in Web3 Social Platforms: A Post-Quantum Biometric Approach 6th Workshop on Secure IoT, Edge and Cloud systems (SIoTEC), The 34th ACM International Conference on Information and Knowledge Management, Conference on Information and Knowledge Management (CIKM 2025), pp1-6. DOI: https://doi.org/10.1145/3770740.3771878 |
| |
2024 |
S. Kumari, V. Tulshyan and H. Tewari |
Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices Information, 15(126), pp28. DOI: https://doi.org/10.3390/info15030126 |
| |
2023 |
P. Bradish, S. Chaudhari, M. Clear and H. Tewari |
CoviChain: A Blockchain Based COVID-19 Vaccination Passport Future of Information and Communication Conference (FICC). DOI: https://doi.org/10.1007/978-3-031-28076-4_17 |
| |
2023 |
R. Singh, S. Sturley and H. Tewari |
Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network Future Internet, 15(3), pp1-15. DOI: https://doi.org/10.3390/fi15030096 |
| |
2023 |
J. Rowland and H. Tewari |
Optimized Communication in Sharded Blockchain Networks Future of Information and Communication Conference (FICC). DOI: https://doi.org/10.1007/978-3-031-28076-4_18 |
| |
2023 |
M. Clear and H. Tewari |
Anonymous Homomorphic IBE with Application to Anonymous Aggregation Cryptography, 7(2), pp1-19. DOI: https://doi.org/10.3390/cryptography7020022 |
| |
2023 |
R. Singh, Z. Pervez and H. Tewari |
Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload Future Internet, 15(5), pp1-14. DOI: https://doi.org/10.3390/fi15050173 |
| |
2022 |
M. Chun, S. Weber and H. Tewari |
A Lightweight Encryption Scheme for IoT Devices in the Fog Future Technologies Conference (FTC), 560, pp147-161. DOI: https://doi.org/10.1007/978-3-031-18458-1_11 |
| |
2022 |
R. Singh, A. Chauhan and H. Tewari |
Blockchain-Enabled End-to-End Encryption for Instant Messaging Applications 2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp501-506. DOI: https://doi.org/10.1109/WoWMoM54355.2022.00078 |
| |
2022 |
S. Kumari, M. Singh, R. Singh and H. Tewari |
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices Computer Networks, 127. DOI: https://doi.org/10.1016/j.comnet.2022.109327 |
| |
2022 |
S. Kumari, M. Singh, R. Singh and H. Tewari |
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices Knowledge-Based Systems. DOI: https://doi.org/10.1016/j.knosys.2022.109543 |
| |
2022 |
S. Kumari, M. Singh, R. Singh and H. Tewari |
Post-quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey Journal of Software: Practice and Experience. DOI: https://doi.org/10.1002/spe.3121 |
| |
2022 |
A. Banerjee and H. Tewari |
Multiverse of HawkNess: A Universally-Composable MPC- based Hawk Variant Cryptography, 6(3), pp22. DOI: https://doi.org/10.3390/cryptography6030039 |
| |
2021 |
S. Chaudhari, M. Clear, P. Bradish and H. Tewari |
Framework for a DLT Based COVID-19 Passport Computing Conference 2021, 285, pp108-123. DOI: /10.1007/978-3-030-80129-8_9 |
| |
2021 |
A. Banerjee, M. Clear and H. Tewari |
zkHawk: Practical Private Smart Contracts from MPC-based Hawk 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pp245-248. DOI: https://10.1109/BRAINS52497.2021.9569822 |
| |
2021 |
S. Kumari, M. Singh, R. Singh and H. Tewari |
To Secure the Communication in Powerful Internet of Things Using Innovative Post‑Quantum Cryptographic Method Arabian Journal for Science and Engineering. DOI: https://doi.org/10.1007/s13369-021-06166-6 |
| |
2021 |
Banerjee, Aritra and Clear, Michael and Tewari, Hitesh |
ZkHawk: Practical Private Smart Contracts from MPC-based Hawk 2021 3rd Conference on Blockchain Research and Applications for Innovative Networks and Services, BRAINS 2021, pp245 â 248. DOI: http://dx.doi.org/10.1109/BRAINS52497.2021.9569822 |
| |
2020 |
M. Togou, T. Bi, K. Dev, K. McDonnell, A. Milenovic, H. Tewari and G. Muntean |
A Distributed Blockchain-based Broker for Efficient Resource Provisioning in 5G Networks International Wireless Communications and Mobile Computing Conference (IWCMC), pp1485-1490. DOI: http://dx.doi.org/10.1109/IWCMC48107.2020.9148565 |
| |
2020 |
M. Togou, T. Bi, K. Dev, K. McDonnell, A. Milenovic, H. Tewari and G. Muntean |
DBNS: A Distributed Blockchain-Enabled Network Slicing Framework for 5G Networks IEEE Communications Magazine, pp90-96. DOI: http://dx.doi.org/10.1109/MCOM.001.2000112 |
| |
2020 |
A. Banerjee, M. Clear and H. Tewari |
Demystifying the Role of zk-SNARKs in Zcash IEEE Conference on Applications, Information and Network Security (AINS) |
| |
2020 |
R. Singh, A. Donegan and H. Tewari |
Framework for a Decentralized Web International Telecommunication Networks and Application Conference (ITNAC), pp1-7. DOI: https://doi.org/10.1109/ITNAC50341.2020.9315032 |
| |
2020 |
A. Banerjee, M. Clear and H. Tewari |
Demystifying the Role of zk-SNARKs in Zcash IEEE Conference on Applications, Information and Network Security, pp12-19. DOI: https://doi.org/10.1109/AINS50155.2020.9315064 |
| |
2019 |
S. Sharkey and H. Tewari |
Alt-PoW: An Alternative Proof-of-Work Mechanism IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp11-18. DOI: http://dx.doi.org/10.1109 |
| |
2019 |
H. Vu and H. Tewari |
An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding International Conference on Emerging Technologies in Computing 2019 (iCETiC '19) , pp29-45. DOI: http://dx.doi.org/10.1007/978-3-030-23943-5_3 |
| |
2019 |
H. Tewari |
Blockchain Research Beyond Cryptocurrencies IEEE Communications Standards Magazine, 3(4), pp21-25. DOI: http://dx.doi.org/10.1109/MCOMSTD.001.1900026 |
| |
2018 |
S. Gourley and H. Tewari |
Blockchain Backed DNSSEC 1st Workshop on Blockchain and Smart Contract Technologies - 21st International Conference on Business Information Systems, 339, pp173-184. DOI: http://dx.doi.org/10.1007/978-3-030-04849-5_15 |
| |
2018 |
M. Hanley and H. Tewari |
Managing Lifetime Healthcare Data on the Blockchain The 2018 Special Session on BlockChain and its Applications - IEEE Smart World Congress. DOI: http://dx.doi.org/10.1109/SmartWorld.2018.00077 |
| |
2017 |
H. Tewari, A. Hughes, S. Weber and T., Barry |
X509Cloud - Framework for a Ubiquitous PKI IEEE Military Communications Conference (MILCOM 2017), pp225-230. DOI: http://dx.doi.org/10.1109/MILCOM.2017.8170796 |
| |
2017 |
P. Tarasov, and H. Tewari |
Internet Voting Using Zcash 14th International Conference on Applied Computing, pp159-170 |
| |
2017 |
R. Tahiliani, and H. Tewari |
Implementation of PI2 Queuing Discipline for Classic TCP Traffic in ns-3 16th International IFIP TC6 Networking Conference, Networking 2017. DOI: http://dx.doi.org/10.23919/IFIPNetworking.2017.8264883 |
| |
2017 |
P. Tarasov and H. Tewari |
The Future of E-Voting IADIS International Journal on Computer Science and Information Systems, 12(2), pp148-165 |
| |
2015 |
H. Tewari and E. ONuallain |
Netcoin - A Traceable P2P Electronic Cash System IEEE International Conference on Web Services (ICWS), pp472-478. DOI: http://dx.doi.org/10.1109/ICWS.2015.69 |
| |
2014 |
Clear, Michael; Tewari, Hitesh; Mc Goldrick, Ciaran |
Anonymous IBE from Quadratic Residuosity with Improved Performance Progress in Cryptology - AFRICACRYPT 2014, pp377-397. DOI: http://dx.doi.org/10.1007/978-3-319-06734-6_23 |
| |
2013 |
M. Clear, A. Hughes and H. Tewari |
Homomorphic Encryption with Access Policies: Characterization and New Constructions AFRICACRYPT, 7918, pp61-87. DOI: http://dx.doi.org/10.1007/978-3-642-38553-7_4 |
| |
2012 |
M. Clear, K. Reid, D. Ennis, A. Hughes and H. Tewari |
Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems Information Security Conference (ISC 2012), 7483, pp204-223. DOI: http://dx.doi.org/10.1007/978-3-642-33383-5_13 |
| |
2011 |
Clear, M |
Efficient Quantum-Resistant Identity Based Cryptography The Undergraduate Journal of Ireland & Northern Ireland, pp93-153 |
| |
2005 |
I.Stamouli, P. Argyroudis and H. Tewari |
Real-time Intrusion Detection for Ad hoc Networks WOWMOM05, pp374-380. DOI: http://dx.doi.org/10.1109/WOWMOM.2005.85 |
| |
2004 |
P. Argyroudis, R. Verma, H. Tewari and D. O'Mahony |
Performance analysis of cryptographic protocols on handheld devices Third IEEE International Symposium Network Computing and Applications, 2004. (NCA 2004). , pp169-174. DOI: http://dx.doi.org/10.1109/NCA.2004.1347774 |
| |
2004 |
P. Argyroudis, R. Verma, H. Tewari and D. O'Mahony |
Performance Analysis of Cryptographic Protocols on Handheld Devices Proceedings of 3rd IEEE International Symposium on Network Computing and Applications, pp169-174. DOI: http://dx.doi.org/10.1109/nca.2004.1347774 |
| |
2003 |
H. Tewari and D. O'Mahony |
Multiparty micropayments for ad hoc networks Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC) 2003, 3, pp2033-2040. DOI: http://dx.doi.org/10.1109/WCNC.2003.1200699 |
| |
2003 |
H. Tewari and D. O'Mahony |
Real-Time Payments for Mobile IP IEEE Communications, 41(2), pp126-136. DOI: http://dx.doi.org/10.1109/mcom.2003.1179561 |