Ashutosh Saxena
Professor
Ashutosh Saxena's AcademicInfluence.com Rankings
Download Badge
Computer Science
Ashutosh Saxena's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Ashutosh Saxena Influential?
(Suggest an Edit or Addition)According to Wikipedia, Ashutosh Saxena is an Indian-American computer scientist, researcher, and entrepreneur known for his contributions to the field of artificial intelligence and robotics. His research interests include deep learning, robotics, and 3-dimensional computer vision. Saxena is the co-founder and CEO of Caspar.AI, which is an artificial intelligence company that automates peoples' homes and builds applications such as fall detectors for senior living. Prior to Caspar.AI, Ashutosh co-founded Cognical Katapult , which provides a no credit required alternative to traditional financing for online and omni-channel retail. Before Katapult, Saxena was an assistant professor in the Computer Science Department and faculty director of the RoboBrain Project at Cornell University.
Ashutosh Saxena's Published Works
Published Works
- A dynamic ID-based remote user authentication scheme (2004) (619)
- Data integrity proofs in cloud storage (2011) (158)
- A novel remote user authentication scheme using bilinear pairings (2006) (154)
- An Efficient Certificateless Signature Scheme (2005) (144)
- An improved bilinear pairing based remote user authentication scheme (2009) (70)
- Identity Based Strong Designated Verifier Signature Scheme (2007) (59)
- Cryptanalysis of recently proposed Remote User Authentication Schemes (2006) (58)
- A Survey on ID-Based Cryptographic Primitives (2005) (50)
- Hierarchical key management scheme using polynomial interpolation (2005) (48)
- A Green Software Development Life Cycle for Cloud Computing (2013) (45)
- An efficient secure key issuing protocol in ID-based cryptosystems (2005) (39)
- A cryptography based privacy preserving solution to mine cloud data (2010) (37)
- MMPS: a versatile mobile-to-mobile payment system (2005) (32)
- Threshold key issuing in identity-based cryptosystems (2007) (32)
- Mutual Authentication and Key Agreement for GSM (2006) (31)
- Algorithms and Approaches of Proxy Signature: A Survey (2006) (29)
- Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing (2010) (26)
- Verifiably Encrypted Signature Scheme Without Random Oracles (2005) (25)
- Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings (2007) (22)
- An Efficient Proxy Signature Scheme with Revocation (2004) (19)
- A privacy preserving Jaccard similarity function for mining encrypted data (2009) (18)
- Universal Designated Multi Verifier Signature without Random Oracles (2006) (17)
- Threshold SKI Protocol for ID-based Cryptosystems (2007) (16)
- Identity Based Multisignatures (2006) (16)
- A security framework for mobile-to-mobile payment network (2005) (14)
- A Novel Remote User Authentication Scheme Through Dynamic Login Identity (2004) (13)
- Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems (2006) (13)
- Energy analysis of security for cloud application (2011) (12)
- Dynamic authentication: Need than a choice (2008) (11)
- An Approach to Measure Security of Cloud Hosted Application (2013) (9)
- A New Scheme for Mobile Based CAPTCHA Service on Cloud (2012) (9)
- Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach (2008) (8)
- A neural network approach for data masking (2011) (8)
- A Digital Signature Architecture for Web Apps (2013) (8)
- An Effective Certificateless Signature Scheme Based on Bilinear Pairings (2005) (8)
- A Robust Wavelet Based Digital Watermarking Scheme Using Chaotic Mixing (2007) (8)
- Danger theory based SYN flood attack detection in autonomic network (2009) (8)
- ZERO DATA REMNANCE PROOF IN CLOUD STORAGE (2010) (7)
- A DRM framework towards preventing digital piracy (2011) (7)
- Dynamic Remote User Authentication (2003) (6)
- HEMIN: A Cryptographic Approach for Private k-NN Classification (2008) (5)
- Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems (2005) (5)
- A security analysis of smartphone data flow and feasible solutions for lawful interception (2011) (5)
- Application security code analysis: a step towards software assurance (2009) (5)
- Machine Learning Approach for Analysing Encrypted Data (2018) (4)
- An Efficient Authentication Protocol for GSM (2007) (4)
- Security Analysis of Lal and Awasthi's Proxy Signature Schemes (2003) (4)
- Identification of Cryptographic Algorithms Using Clustering Techniques (2020) (3)
- Cryptanalysis and Improvement of a Multisignature Scheme (2005) (3)
- An anonymous peer-to-peer based online social network (2011) (3)
- Pairing based Mutual Authentication Scheme Using Smart Cards (2006) (3)
- Singular Value Decomposition (SVD) Based Attack on Different Watermarking Schemes (2006) (2)
- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach (2013) (2)
- Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing (2005) (2)
- An integrated framework for enhancing privacy in online social networks (2013) (1)
- Privacy Layer for Business Intelligence (2010) (1)
- A Secure Dynamic Remote User Authentication without any Secure Channel (2007) (1)
- Towards Logically and Physically Secure Public-Key Infrastructures (2002) (1)
- A Privacy-Aware Dynamic Authentication Scheme for IoT Enabled Business Services (2019) (1)
- A robust scheme on proof of data retrievability in cloud (2014) (1)
- An efficient and secure protocol for DTV broadcasts (2009) (1)
- Secure computation for data privacy (2007) (1)
- AtDRM: a DRM architecture with rights transfer and revocation capability (2013) (1)
- Verifiably Encrypted Signature Scheme with Threshold Adjudication (2006) (1)
- Personalized Data Set for Analysis (2010) (1)
- On Reduction of Bootstrapping Information Using Digital Multisignature (2004) (0)
- Quantum cryptographic protocols for secure comunication (2015) (0)
- A Cloud Based Service for Internet Users to Track Privacy-Related Data in Web (2016) (0)
- On gossip codes and traceability schemes (2004) (0)
- Measuring Security for Applications Hosted in Cloud 2960 (2019) (0)
- Reed Solomon Codes for Digital Fingerprinting (2002) (0)
- A novel cryptographic protocol for privacy preserving classification over distributed encrypted databases (2022) (0)
- SPAM: secure protocol for authentication in mobile-communications (2005) (0)
- Towards Finding Active Number of S-Boxes in Block Ciphers using Mixed Integer Linear Programming (2021) (0)
- Software Vulnerabilities Exposed (2014) (0)
- Credit Based Micro Licensing Scheme for Digital Services (2012) (0)
- An Introduction to Digital Rights Management (2013) (0)
- A novel cryptographic protocol for privacy preserving classification over distributed encrypted databases (2022) (0)
- ID-based Serial Multisignature Scheme using Bilinear Pairings (2005) (0)
- Cover Story 8 Cloud Security – Challenges at a Glance (2015) (0)
- A Graph-Based Approach for IP Network Analysis (2019) (0)
- Trust Models for Data Integrity and Data Shredding in Cloud (2013) (0)
- Group key exchange with non-linear trust (2011) (0)
This paper list is powered by the following services:
Other Resources About Ashutosh Saxena
What Schools Are Affiliated With Ashutosh Saxena?
Ashutosh Saxena is affiliated with the following schools: