|
2024 |
S. Kumari, V. Tulshyan and H. Tewari |
Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices Information, 15(126), pp28. DOI: https://doi.org/10.3390/info15030126 |
|
2023 |
P. Bradish, S. Chaudhari, M. Clear and H. Tewari |
CoviChain: A Blockchain Based COVID-19 Vaccination Passport Future of Information and Communication Conference (FICC). DOI: https://doi.org/10.1007/978-3-031-28076-4_17 |
|
2023 |
R. Singh, S. Sturley and H. Tewari |
Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network Future Internet, 15(3), pp1-15. DOI: https://doi.org/10.3390/fi15030096 |
|
2023 |
J. Rowland and H. Tewari |
Optimized Communication in Sharded Blockchain Networks Future of Information and Communication Conference (FICC). DOI: https://doi.org/10.1007/978-3-031-28076-4_18 |
|
2023 |
M. Clear and H. Tewari |
Anonymous Homomorphic IBE with Application to Anonymous Aggregation Cryptography, 7(2), pp1-19. DOI: https://doi.org/10.3390/cryptography7020022 |
|
2023 |
R. Singh, Z. Pervez and H. Tewari |
Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload Future Internet, 15(5), pp1-14. DOI: https://doi.org/10.3390/fi15050173 |
|
2022 |
M. Chun, S. Weber and H. Tewari |
A Lightweight Encryption Scheme for IoT Devices in the Fog Future Technologies Conference (FTC), 560, pp147-161. DOI: https://doi.org/10.1007/978-3-031-18458-1_11 |
|
2022 |
R. Singh, A. Chauhan and H. Tewari |
Blockchain-Enabled End-to-End Encryption for Instant Messaging Applications 2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp501-506. DOI: https://doi.org/10.1109/WoWMoM54355.2022.00078 |
|
2022 |
S. Kumari, M. Singh, R. Singh and H. Tewari |
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices Computer Networks, 127. DOI: https://doi.org/10.1016/j.comnet.2022.109327 |
|
2022 |
S. Kumari, M. Singh, R. Singh and H. Tewari |
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices Knowledge-Based Systems. DOI: https://doi.org/10.1016/j.knosys.2022.109543 |
|
2022 |
S. Kumari, M. Singh, R. Singh and H. Tewari |
Post-quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey Journal of Software: Practice and Experience. DOI: https://doi.org/10.1002/spe.3121 |
|
2022 |
A. Banerjee and H. Tewari |
Multiverse of HawkNess: A Universally-Composable MPC- based Hawk Variant Cryptography, 6(3), pp22. DOI: https://doi.org/10.3390/cryptography6030039 |
|
2021 |
S. Chaudhari, M. Clear, P. Bradish and H. Tewari |
Framework for a DLT Based COVID-19 Passport Computing Conference 2021, 285, pp108-123. DOI: /10.1007/978-3-030-80129-8_9 |
|
2021 |
A. Banerjee, M. Clear and H. Tewari |
zkHawk: Practical Private Smart Contracts from MPC-based Hawk 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pp245-248. DOI: https://10.1109/BRAINS52497.2021.9569822 |
|
2021 |
S. Kumari, M. Singh, R. Singh and H. Tewari |
To Secure the Communication in Powerful Internet of Things Using Innovative Post‑Quantum Cryptographic Method Arabian Journal for Science and Engineering. DOI: https://doi.org/10.1007/s13369-021-06166-6 |
|
2020 |
M. Togou, T. Bi, K. Dev, K. McDonnell, A. Milenovic, H. Tewari and G. Muntean |
A Distributed Blockchain-based Broker for Efficient Resource Provisioning in 5G Networks International Wireless Communications and Mobile Computing Conference (IWCMC), pp1485-1490. DOI: http://dx.doi.org/10.1109/IWCMC48107.2020.9148565 |
|
2020 |
M. Togou, T. Bi, K. Dev, K. McDonnell, A. Milenovic, H. Tewari and G. Muntean |
DBNS: A Distributed Blockchain-Enabled Network Slicing Framework for 5G Networks IEEE Communications Magazine, pp90-96. DOI: http://dx.doi.org/10.1109/MCOM.001.2000112 |
|
2020 |
A. Banerjee, M. Clear and H. Tewari |
Demystifying the Role of zk-SNARKs in Zcash IEEE Conference on Applications, Information and Network Security (AINS) |
|
2020 |
R. Singh, A. Donegan and H. Tewari |
Framework for a Decentralized Web International Telecommunication Networks and Application Conference (ITNAC), pp1-7. DOI: https://doi.org/10.1109/ITNAC50341.2020.9315032 |
|
2020 |
A. Banerjee, M. Clear and H. Tewari |
Demystifying the Role of zk-SNARKs in Zcash IEEE Conference on Applications, Information and Network Security, pp12-19. DOI: https://doi.org/10.1109/AINS50155.2020.9315064 |
|
2019 |
S. Sharkey and H. Tewari |
Alt-PoW: An Alternative Proof-of-Work Mechanism IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp11-18. DOI: http://dx.doi.org/10.1109 |
|
2019 |
H. Vu and H. Tewari |
An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding International Conference on Emerging Technologies in Computing 2019 (iCETiC '19) , pp29-45. DOI: http://dx.doi.org/10.1007/978-3-030-23943-5_3 |
|
2019 |
H. Tewari |
Blockchain Research Beyond Cryptocurrencies IEEE Communications Standards Magazine, 3(4), pp21-25. DOI: http://dx.doi.org/10.1109/MCOMSTD.001.1900026 |
|
2018 |
S. Gourley and H. Tewari |
Blockchain Backed DNSSEC 1st Workshop on Blockchain and Smart Contract Technologies - 21st International Conference on Business Information Systems, 339, pp173-184. DOI: http://dx.doi.org/10.1007/978-3-030-04849-5_15 |
|
2018 |
M. Hanley and H. Tewari |
Managing Lifetime Healthcare Data on the Blockchain The 2018 Special Session on BlockChain and its Applications - IEEE Smart World Congress. DOI: http://dx.doi.org/10.1109/SmartWorld.2018.00077 |
|
2017 |
H. Tewari, A. Hughes, S. Weber and T., Barry |
X509Cloud - Framework for a Ubiquitous PKI IEEE Military Communications Conference (MILCOM 2017), pp225-230. DOI: http://dx.doi.org/10.1109/MILCOM.2017.8170796 |
|
2017 |
P. Tarasov, and H. Tewari |
Internet Voting Using Zcash 14th International Conference on Applied Computing, pp159-170 |
|
2017 |
R. Tahiliani, and H. Tewari |
Implementation of PI2 Queuing Discipline for Classic TCP Traffic in ns-3 16th International IFIP TC6 Networking Conference, Networking 2017. DOI: http://dx.doi.org/10.23919/IFIPNetworking.2017.8264883 |
|
2017 |
P. Tarasov and H. Tewari |
The Future of E-Voting IADIS International Journal on Computer Science and Information Systems, 12(2), pp148-165 |
|
2015 |
H. Tewari and E. ONuallain |
Netcoin - A Traceable P2P Electronic Cash System IEEE International Conference on Web Services (ICWS), pp472-478. DOI: http://dx.doi.org/10.1109/ICWS.2015.69 |
|
2014 |
Clear, Michael; Tewari, Hitesh; Mc Goldrick, Ciaran |
Anonymous IBE from Quadratic Residuosity with Improved Performance Progress in Cryptology - AFRICACRYPT 2014, pp377-397. DOI: http://dx.doi.org/10.1007/978-3-319-06734-6_23 |
|
2013 |
M. Clear, A. Hughes and H. Tewari |
Homomorphic Encryption with Access Policies: Characterization and New Constructions AFRICACRYPT, 7918, pp61-87. DOI: http://dx.doi.org/10.1007/978-3-642-38553-7_4 |
|
2012 |
M. Clear, K. Reid, D. Ennis, A. Hughes and H. Tewari |
Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems Information Security Conference (ISC 2012), 7483, pp204-223. DOI: http://dx.doi.org/10.1007/978-3-642-33383-5_13 |
|
2011 |
Clear, M |
Efficient Quantum-Resistant Identity Based Cryptography The Undergraduate Journal of Ireland & Northern Ireland, pp93-153 |
|
2005 |
I.Stamouli, P. Argyroudis and H. Tewari |
Real-time Intrusion Detection for Ad hoc Networks WOWMOM05, pp374-380. DOI: http://dx.doi.org/10.1109/WOWMOM.2005.85 |
|
2004 |
P. Argyroudis, R. Verma, H. Tewari and D. O'Mahony |
Performance analysis of cryptographic protocols on handheld devices Third IEEE International Symposium Network Computing and Applications, 2004. (NCA 2004). , pp169-174. DOI: http://dx.doi.org/10.1109/NCA.2004.1347774 |
|
2004 |
P. Argyroudis, R. Verma, H. Tewari and D. O'Mahony |
Performance Analysis of Cryptographic Protocols on Handheld Devices Proceedings of 3rd IEEE International Symposium on Network Computing and Applications, pp169-174. DOI: http://dx.doi.org/10.1109/nca.2004.1347774 |
|
2003 |
H. Tewari and D. O'Mahony |
Multiparty micropayments for ad hoc networks Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC) 2003, 3, pp2033-2040. DOI: http://dx.doi.org/10.1109/WCNC.2003.1200699 |
|
2003 |
H. Tewari and D. O'Mahony |
Real-Time Payments for Mobile IP IEEE Communications, 41(2), pp126-136. DOI: http://dx.doi.org/10.1109/mcom.2003.1179561 |
|
2003 |
R. Verma, D. O'Mahony and H. Tewari |
Progressive Authentication in Ad Hoc Networks Proceedings of The Fifth European Wireless Conference |
|
2003 |
R. Verma, H. Tewari and D. O'Mahony |
Wanderer: Secure Group Formation and Communication in Ad Hoc Networks Proceedings of the 2nd Joint IEI/IEE Telecommunications Systems Research Symposium |
|
2003 |
H. Tewari and D. O'Mahony |
Real-time payments for mobile IP IEEE Communications Magazine, 41(2), pp126-136. DOI: http://dx.doi.org/10.1109/mcom.2003.1179561 |
|
2002 |
H. Tewari and D. O'Mahony |
Lightweight AAA for Cellular IP Proceedings of European Wireless 2002, pp301-306 |
|
2002 |
J. Flynn, H. Tewari and D. O'Mahony |
A Real-Time Emulation System for Ad Hoc Networks Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), pp115-120 |
|
2001 |
D. O'Mahony, M. Peirce and H. Tewari |
Electronic Payment Systems for E-Commerce , pp342 |
|
2001 |
R. Verma, D. O'Mahony and H. Tewari |
NTM- Progressive Trust Negotiation in Ad Hoc Networks Proceedings of the First Joint IEI/IEE Symposium on Telecommunications Systems Research, pp8 |
|
2001 |
J. Flynn, H. Tewari and D. O'Mahony |
Jemu: A Wireless Network Emulator for Mobile Ad Hoc Networks Proceedings of the First Joint IEI/IEE Symposium on Telecommunications Systems Research, pp6 |
|
1998 |
D. O'Mahony, L. Doyle, H. Tewari and M. Peirce |
NOMAD - An Application to Provide UMTS Telephony Services on Fixed Terminals in COBUCO Proceedings of the 3rd ACTS Mobile Communications Summit, pp72-76 |
|
1997 |
D. O'Mahony, M. Peirce and H. Tewari |
Electronic Payment Systems , pp250 |
|
1996 |
Tewari, H., McCourt, M., O'Mahony, D. |
Advanced Electronic Commerce Security in a Workflow Environment Electronic Commerce: Current Research Issues and Applications, pp69-85 |