default search action
Himanshu Khurana
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2016
- [j8]Jun Ho Huh, Rakesh B. Bobba, Tom Markham, David M. Nicol, Julie Hull, Alexander Chernoguzov, Himanshu Khurana, Kevin Staggs, Jingwei Huang:
Next-Generation Access Control for Distributed Control Systems. IEEE Internet Comput. 20(5): 28-37 (2016) - 2015
- [j7]Saman A. Zonouz, Robin Berthier, Himanshu Khurana, William H. Sanders, Tim Yardley:
Seclius: An Information Flow-Based, Consequence-Centric Security Metric. IEEE Trans. Parallel Distributed Syst. 26(2): 562-573 (2015) - 2014
- [j6]Sean Peisert, Jonathan Margulies, David M. Nicol, Himanshu Khurana, Chris Sawall:
Designed-in Security for Cyber-Physical Systems. IEEE Secur. Priv. 12(5): 9-12 (2014) - [j5]Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:
RRE: A Game-Theoretic Intrusion Response and Recovery Engine. IEEE Trans. Parallel Distributed Syst. 25(2): 395-406 (2014) - 2010
- [j4]Himanshu Khurana, Mark Hadley, Ning Lu, Deborah A. Frincke:
Smart-Grid Security Issues. IEEE Secur. Priv. 8(1): 81-85 (2010) - [j3]Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Based Messaging: Access Control and Confidentiality. ACM Trans. Inf. Syst. Secur. 13(4): 31:1-31:35 (2010) - [j2]Katherine M. Rogers, Ray Klump, Himanshu Khurana, Angel A. Aquino-Lugo, Thomas J. Overbye:
An Authenticated Control Framework for Distributed Voltage Support on the Smart Grid. IEEE Trans. Smart Grid 1(1): 40-47 (2010) - 2006
- [j1]Himanshu Khurana, Radostina K. Koleva:
Scalable Security and Accounting Services for Content-Based Publish/Subscribe Systems. Int. J. E Bus. Res. 2(3): 1-16 (2006)
Conference and Workshop Papers
- 2015
- [c29]Apurva Mohan, Himanshu Khurana:
Implementing Cyber Security Requirements and Mechanisms in Microgrids. Critical Infrastructure Protection 2015: 229-244 - [c28]Apurva Mohan, Gregory Brainard, Himanshu Khurana, Scott Fischer:
A Cyber Security Architecture for Microgrid Deployments. Critical Infrastructure Protection 2015: 245-259 - 2010
- [c27]Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yardley, Pooja Agarwal, Erich Heine:
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols. HICSS 2010: 1-10 - [c26]Qiyan Wang, Long H. Vu, Klara Nahrstedt, Himanshu Khurana:
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming. INFOCOM 2010: 296-300 - [c25]Jian Wang, Tim Yardley, Himanshu Khurana, Liying Wang:
LENS: Location-based emergency notification service. ISCRAM 2010 - 2009
- [c24]Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf:
PBES: a policy based encryption system with application to data sharing in the power grid. AsiaCCS 2009: 262-275 - [c23]Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:
RRE: A game-theoretic intrusion Response and Recovery Engine. DSN 2009: 439-448 - [c22]Rakeshbabu Bobba, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. ESORICS 2009: 587-604 - [c21]Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Michael Freemon, Von Welch, Randy Butler:
Palantir: a framework for collaborative incident response and investigation. IDtrust 2009: 38-51 - [c20]Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Basney, Himanshu Khurana:
Usable secure mailing lists with untrusted servers. IDtrust 2009: 103-116 - [c19]Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Nahrstedt:
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication. INFOCOM 2009: 1233-1241 - 2008
- [c18]Terry Fleury, Himanshu Khurana, Von Welch:
Towards A Taxonomy Of Attacks Against Energy Control Systems. Critical Infrastructure Protection 2008: 71-85 - 2007
- [c17]Himanshu Khurana, Radostina K. Koleva, Jim Basney:
Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems. eScience 2007: 431-439 - [c16]Himanshu Khurana, Mohammad Maifi Hasan Khan, Von Welch:
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid. HICSS 2007: 115 - [c15]Rakeshbabu Bobba, Himanshu Khurana:
DLPKH - Distributed Logical Public-Key Hierarchy. ICISS 2007: 110-127 - 2006
- [c14]Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana:
Using Attribute-Based Access Control to Enable Attribute-Based Messaging. ACSAC 2006: 403-413 - [c13]Himanshu Khurana, Hyung-Seok Hahm:
Certified mailing lists. AsiaCCS 2006: 46-58 - [c12]Himanshu Khurana, Jim Basney, Von Welch, Roy H. Campbell:
Operational Security Requirements for Large Collaborative Compute Infrastructures. CollaborateCom 2006 - [c11]Himanshu Khurana, Jin Heo, Meenal Pant:
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. ICICS 2006: 260-281 - [c10]Jim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli, Meenal Pant, Adam J. Slagell, Von Welch:
Mithril: Adaptable Security for Survivability in Collaborative Computing Sites. SecureComm 2006: 1-7 - 2005
- [c9]Himanshu Khurana, Rafael Bonilla, Adam J. Slagell, Raja Afandi, Hyung-Seok Hahm, Jim Basney:
Scalable Group Key Management with Partially Trusted Controllers. ICN (2) 2005: 662-672 - [c8]Rakeshbabu Bobba, Serban I. Gavrila, Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva:
Administering Access Control in Dynamic Coalitions. LISA 2005: 249-261 - [c7]Himanshu Khurana, Adam J. Slagell, Rafael Bonilla:
SELS: a secure e-mail list service. SAC 2005: 306-313 - [c6]Himanshu Khurana:
Scalable security and accounting services for content-based publish/subscribe systems. SAC 2005: 801-807 - 2004
- [c5]Himanshu Khurana, Virgil D. Gligor:
A Model for Access Negotiations in Dynamic Coalitions. WETICE 2004: 205-210 - 2003
- [c4]Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras:
Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40 - 2002
- [c3]Himanshu Khurana, Virgil D. Gligor, John Linn:
Reasoning about Joint Administration of Access Policies for Coalition Resources. ICDCS 2002: 429-438 - 2001
- [c2]Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras:
On the Negotiation of Access Control Policies. Security Protocols Workshop 2001: 188-201 - 2000
- [c1]Himanshu Khurana, Virgil D. Gligor:
Review and Revocation of Access Privileges Distributed with PKI Certificates. Security Protocols Workshop 2000: 100-112
Informal and Other Publications
- 2009
- [i1]Rakeshbabu Bobba, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2009: 371 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint