default search action
Abhishek Parakh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Abhishek Parakh, Mahadevan Subramaniam:
QUINTET: An Experiential Learning Platform for Quantum Education. QCE 2024: 128-137 - [c30]Nitin Jha, Abhishek Parakh, Mahadevan Subramanian:
A ML Based Approach to Quantum Augmented HTTP Protocol. QCE 2024: 591-592 - 2023
- [c29]Vidya Bommanapally, Mahadevan Subramaniam, Abhishek Parakh:
Embedding a Problem Graph into Serious Games for Efficient Traversal Through Game Space. FIE 2023: 1-5 - [c28]Ruchitha Mallipeddi, Chris Schaaf, Mahadevan Subramaniam, Abhishek Parakh, Sherri Weitl-Harms
:
A Framework for an Intelligent Adaptive Education Platform for Quantum Cybersecurity. FIE 2023: 1-5 - 2022
- [j13]Joseph Burr, Abhishek Parakh, Mahadevan Subramaniam:
Quantum internet. Ubiquity 2022(August): 1-14 (2022) - [c27]Abhishek Parakh, Mahadevan Subramaniam, Parvathi Chundi:
A Framework for Incorporating Serious Games into Learning Object Repositories through Experiential Learning. HICSS 2022: 1-11 - [i21]Sandeep Mishra
, Kishore Thapliyal
, S. Krish Rewanth, Abhishek Parakh, Anirban Pathak
:
Anonymous voting scheme using quantum assisted blockchain. CoRR abs/2206.03182 (2022) - 2021
- [i20]Abhishek Parakh:
Quantum Teleportation with One Classical Bit. CoRR abs/2110.11254 (2021) - 2020
- [c26]Vidya Bommanapally, Mahadevan Subramaniam, Abhishek Parakh, Parvathi Chundi, Venkata Meghana Puppala:
Learning Objects Based Adaptive Textbooks with Dynamic Traversal for Quantum Cryptography. iTextbooks@AIED 2020: 90-102 - [c25]Abhishek Parakh, Mahadevan Subramaniam, Parvathi Chundi, Elliott Ostler:
A Novel Approach for Embedding and Traversing Problems in Serious Games. SIGITE 2020: 229-235
2010 – 2019
- 2019
- [c24]Abhishek Parakh, Parvathi Chundi, Mahadevan Subramaniam:
An Approach Towards Designing Problem Networks in Serious Games. CoG 2019: 1-8 - 2018
- [c23]Dilanga Abeyrathna
, Srikanth Vadla, Vidya Bommanapally, Mahadevan Subramaniam, Parvathi Chundi, Abhishek Parakh:
Analyzing and Predicting Player Performance in a Quantum Cryptography Serious Game. GALA 2018: 267-276 - 2017
- [j12]Abhishek Parakh, Zhiwei Wang:
Introduction to the Special Section on Challenges and Solutions in Mobile Systems Security. Comput. Electr. Eng. 59: 201-203 (2017) - [j11]Dario Ghersi
, Abhishek Parakh, Mihaly Mezei:
Comparison of a quantum random number generator with pseudorandom number generators for their use in molecular Monte Carlo simulations. J. Comput. Chem. 38(31): 2713-2720 (2017) - [c22]Abhishek Parakh, Mahadevan Subramaniam, Elliott Ostler:
QuaSim: A virtual quantum cryptography educator. EIT 2017: 600-605 - 2016
- [j10]Abhishek Parakh, Pramode K. Verma, Mahadevan Subramaniam:
Improving efficiency of quantum key distribution with probabilistic measurements. Int. J. Secur. Networks 11(1/2): 37-47 (2016) - [j9]Pranav Subramaniam, Abhishek Parakh:
A quantum Diffie-Hellman protocol. Int. J. Secur. Networks 11(4): 213-223 (2016) - [c21]Leonora Gerlock, Abhishek Parakh:
Linear Cryptanalysis of Quasigroup Block Cipher. CISRC 2016: 19:1-19:4 - [c20]Abhishek Parakh, Joel van Brandwijk:
Correcting rotational errors in three stage QKD. ICT 2016: 1-5 - [i19]J. Joel vanBrandwijk, Abhishek Parakh:
Asynchronous Operations on Qubits in Distributed Simulation Environments using QooSim. CoRR abs/1612.08609 (2016) - 2015
- [c19]Abhishek Parakh:
Quantifying the security of a QKD protocol. IEEE ANTS 2015: 1-3 - [c18]Abhishek Parakh:
New protocol for quantum public key cryptography. IEEE ANTS 2015: 1-3 - [c17]William Mahoney
, Abhishek Parakh:
Towards a New Quasigroup Block Cipher for a Single-Chip FPGA Implementation. ICCCN 2015: 1-6 - [c16]Abhishek Parakh:
Cheating Resistant Implicit Security. NCA 2015: 57-62 - 2014
- [c15]Matthew Battey, Abhishek Parakh:
Cryptanalysis of the Quasigroup Block Cipher. ACM Southeast Regional Conference 2014: 62: 1-62: 4 - [c14]Pranav Subramaniam, Abhishek Parakh:
Limits on detecting eavesdropper in QKD protocols. IEEE ANTS 2014: 1-3 - [c13]Pranav Subramaniam, Abhishek Parakh:
A quantum Diffie-Hellman protocol using commuting transformations. IEEE ANTS 2014: 1-6 - [c12]Abhishek Parakh, Pramode K. Verma:
Improving the efficiency of entanglement based quantum key exchange. ICCCN 2014: 1-6 - [c11]Pranav Subramaniam, Abhishek Parakh:
A Quantum Diffie-Hellman Protocol. MASS 2014: 523-524 - [c10]William Mahoney
, Abhishek Parakh, Matthew Battey:
Hardware Implementation of Quasigroup Encryption for SCADA Networks. NCA 2014: 301-305 - 2013
- [j8]Abhishek Parakh:
A probabilistic quantum key transfer protocol. Secur. Commun. Networks 6(11): 1389-1395 (2013) - [j7]Matthew Battey, Abhishek Parakh:
An Efficient Quasigroup Block Cipher. Wirel. Pers. Commun. 73(1): 63-76 (2013) - [c9]Abhishek Parakh, William Mahoney
:
Privacy Preserving Computations Using Implicit Security. ICCCN 2013: 1-6 - [c8]Oliver Bonham-Carter, Abhishek Parakh, Dhundy Bastola:
sEncrypt: An Encryption Algorithm Inspired from Biological Processes. TrustCom/ISPA/IUCC 2013: 321-327 - 2012
- [c7]Abhishek Parakh:
Communication Efficient Oblivious Transfer Using Elliptic Curves. HASE 2012: 173-174 - [c6]Matthew Battey, Abhishek Parakh:
Efficient Quasigroup Block Cipher for Sensor Networks. ICCCN 2012: 1-5 - [i18]Matthew Battey, Abhishek Parakh:
Efficient Quasigroup Block Cipher for Sensor Networks. CoRR abs/1208.2896 (2012) - [i17]Abhishek Parakh:
A Probabilistic Quantum Key Transfer Protocol. IACR Cryptol. ePrint Arch. 2012: 454 (2012) - [i16]Matthew Battey, Abhishek Parakh:
A Quasigroup Based Random Number Generator for Resource Constrained Environments. IACR Cryptol. ePrint Arch. 2012: 471 (2012) - 2011
- [j6]Abhishek Parakh, Subhash C. Kak:
Space efficient secret sharing for implicit data security. Inf. Sci. 181(2): 335-341 (2011) - [c5]Abhishek Parakh, Subhash C. Kak:
Matrix based key agreement algorithms for sensor networks. IEEE ANTS 2011: 1-3 - [c4]Abhishek Parakh, Subhash C. Kak:
A New Small World Lattice. ADCONS 2011: 1-8 - 2010
- [j5]Abhishek Parakh, Subhash C. Kak:
Internet Voting Protocol Based on Improved Implicit Security. Cryptologia 34(3): 258-268 (2010) - [c3]Abhishek Parakh, Subhash C. Kak:
A Tree Based Recursive Information Hiding Scheme. ICC 2010: 1-5 - [i15]Abhishek Parakh, Subhash C. Kak:
Internet voting protocol based on implicit data security. CoRR abs/1001.1711 (2010) - [i14]Abhishek Parakh, Subhash C. Kak:
A Key Distribution Scheme for Sensor Networks Using Structured Graphs. CoRR abs/1001.1936 (2010) - [i13]Abhishek Parakh, Subhash C. Kak:
A Distributed Data Storage Scheme for Sensor Networks. CoRR abs/1001.2326 (2010) - [i12]Abhishek Parakh, Subhash C. Kak:
Recursive Secret Sharing for Distributed Storage and Information Hiding. CoRR abs/1001.3331 (2010)
2000 – 2009
- 2009
- [j4]Abhishek Parakh, Subhash C. Kak:
Online data storage using implicit security. Inf. Sci. 179(19): 3323-3331 (2009) - [c2]Abhishek Parakh, Subhash C. Kak:
A Distributed Data Storage Scheme for Sensor Networks. MobiSec 2009: 14-22 - [i11]Abhishek Parakh, Subhash C. Kak:
Space Efficient Secret Sharing. CoRR abs/0901.4798 (2009) - [i10]Abhishek Parakh, Subhash C. Kak:
Space Efficient Secret Sharing: A Recursive Approach. CoRR abs/0901.4814 (2009) - [i9]Abhishek Parakh, Subhash C. Kak:
A Recursive Threshold Visual Cryptography Scheme. CoRR abs/0902.2487 (2009) - [i8]Abhishek Parakh, Subhash C. Kak:
Space Efficient Secret Sharing: A Recursive Approach. IACR Cryptol. ePrint Arch. 2009: 365 (2009) - [i7]Abhishek Parakh, Subhash C. Kak:
A Tree Based Recursive Scheme for Space Efficient Secret Sharing. IACR Cryptol. ePrint Arch. 2009: 409 (2009) - 2008
- [j3]Abhishek Parakh:
Oblivious Transfer Based on Key Exchange. Cryptologia 32(1): 37-44 (2008) - [c1]Abhishek Parakh, Subhash C. Kak:
Internet Voting Protocol Based on Implicit Data Security. ICCCN 2008: 743-746 - [i6]Abhishek Parakh, Subhash C. Kak:
A Recursive Threshold Visual Cryptography Scheme. IACR Cryptol. ePrint Arch. 2008: 535 (2008) - 2007
- [j2]Abhishek Parakh:
Oblivious Transfer Using Elliptic Curves. Cryptologia 31(2): 125-132 (2007) - [j1]Abhishek Parakh, Subhash C. Kak:
How to improve security in electronic voting? Ubiquity 2007(February): 2:1-2:7 (2007) - [i5]Abhishek Parakh:
Oblivious Transfer based on Key Exchange. CoRR abs/0705.0178 (2007) - 2006
- [i4]Abhishek Parakh:
A d-Sequence based Recursive Random Number Generator. CoRR abs/cs/0603029 (2006) - [i3]Abhishek Parakh:
Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric Oblivious Key Exchange. CoRR abs/cs/0604100 (2006) - [i2]Abhishek Parakh:
Oblivious Transfer using Elliptic Curves. CoRR abs/cs/0605114 (2006) - [i1]Abhishek Parakh:
A d-Sequence based Recursive Random Number Generator. IACR Cryptol. ePrint Arch. 2006: 310 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-26 23:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint