Publications

Books

2018 GATE Computer Science and Information Technology Chapter - Wise Solved Papers (2000 - 2018)
Anil Kumar Verma, Gaurav Sharma , Kuldeep Singh, Wiley India Pvt. Ltd., Pages: 376, ISBN-9788126577835
2015 GATE Computer Science and Information Technology Chapter - Wise Solved Papers (2000 - 2018)
Anil Kumar Verma, Gaurav Sharma , Kuldeep Singh, Wiley India Pvt. Ltd., Pages: 650, ISBN-978-8-12-655086-9

Book Chapters

2019 Lattice-Based Cryptography and Internet of Things
Veronika Kuchta, Gaurav Sharma , Authentication in IoT, Wiley.
2018 Artificial Intelligence based Intrusion Detection System to detect Flooding Attack in VANETs
Mannat Jot Singh Aneja, Tarunpreet Bhatia, Gaurav Sharma , Gulshan Shrivastava, Handbook of Research on Network Forensics and Analysis Techniques, Chapter 6, IGI Global.
2016 Secure Key Establishment in Wireless Sensor Networks
Suman Bala, Gaurav Sharma , Anil K. Verma, Handbook of research on modern cryptographic solutions for computer and cyber security, Chapter 15:342-367, IGI Global

Journal Papers

2021 Exploring the Security Landscape: NoC-based MPSoC to Cloud-of-Chips
Gaurav Sharma , Georgios Bousdras, Soultana Ellinidou, Olivier Markowitch, Jean- Michel Dricot, Dragomir Milojevic, Microprocessors and Microsystems, Elsevier.
2019 A Twofold Group Key Agreement Protocol for NoC based MPSoCs
Gaurav Sharma , Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Suman Bala, Olivier Markowitch, Jean-Michel Dricot, Transactions on Emerging Telecommunications Technologies, 30(6), Wiley.
2019 SSPSoC: A Secure SDN-Based Protocol over MPSoC
Soultana Ellinidou, Gaurav Sharma , Théo Rigas, Tristan Vanspouwen, Olivier Markowitch, Jean-Michel Dricot, Security and Communication Networks, Hindawi.
2019 An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps
Pankaj Kumar, Vishnu Sharma, Gaurav Sharma , Tarunpreet Bhatia, International Journal of Information Security and Privacy (IJISP), 13(4), IGI Global.
2019 Towards a Secure Incremental Proxy Re-encryption for E-healthcare Data Sharing in Mobile Cloud Computing
Tarunpreet Bhatia, Anil K. Verma, Gaurav Sharma , Concurrency and Computation: Practical Experience, Wiley.
2019 On the Security of Authenticated Group Key Agreement Protocols
Suman Bala, Gaurav Sharma , Himani Bansal, Tarunpreet Bhatia, Scalable Computing: Practice and Experience, 20(1).
2018 Secure Sharing of Mobile Personal Healthcare Records using Certificateless Proxy Reencryption in Cloud
Tarunpreet Bhatia, Anil K. Verma, Gaurav Sharma , Transactions on Emerging Telecommunications Technologies, 29(6), Wiley.
2018 Public Key Encryption with Integrated Keyword Search
Vishal Saraswat, Rajeev Anand Sahu, Veronika Kuchta, Gaurav Sharma , Olivier Markowitch, Journal of Hardware and System Security, 3:12–25 Springer.
2018 A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks
Tarunpreet Bhatia, Anil K. Verma, Gaurav Sharma , Suman Bala, Recent Patents on Engineering, Vol. 11, Bentham Science.
2017 An Energy Efficient And Trust Aware Framework for Secure Routing In Leach For Wireless Sensor Networks
Arzoo Miglani, Tarunpreet Bhatia, Gaurav Sharma , Gulshan Shrivastava, Scalable Computing: Practice and Experience, 18(3):207-218.
2017 PF-IBS: Pairing-Free Identity Based digital Signature Algorithm for Wireless Sensor Networks
Gaurav Sharma , Suman Bala, Anil K. Verma, Wireless Personal Communications, 97(1):1185–1196, Springer.
2016 Impersonation Attack on CertificateLess Key Agreement Protocol
Suman Bala, Gaurav Sharma , Anil K. Verma, International Journal of Ad Hoc and Ubiquitous Computing, 27(2):108-120 Inderscience.
2016 PF-ID-2PAKA: Pairing Free Identitybased Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks
Suman Bala, Gaurav Sharma , Anil K. Verma, Wireless Personal Communications, 87(3):995-1012, Springer
2016 A Computational Review of Identity Based Signcryption Schemes
Murari Mandal, Gaurav Sharma , Anil K. Verma, International Journal of Network Security (IJNS), 18(5):969-977
2016 An Improved RSA based Certificateless Signature Scheme for Wireless Sensor Networks
Gaurav Sharma , Suman Bala, Anil K. Verma, International Journal of Network Security (IJNS), 18(1):82-89
2015 Pairing-Free CertificateLess Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor networks
Gaurav Sharma , Suman Bala, Anil K. Verma, Wireless Personal Communications, 84(2):1469-1485, Springer
2014 Feasibility of Public Key Cryptography in Wireless Sensor Network
Murari Mandal, Gaurav Sharma , Suman Bala, Anil K. Verma, Journal of Theoretical Physics and Cryptography, 7:20-24
2013 An Identity-based Ring Signcryption Scheme:Evaluation for Wireless Sensor Networks
Gaurav Sharma , Suman Bala, Anil K. Verma, IEIE Transactions on Smart Processing and Computing, 2(2):57-65
2013 On the Security of Certificateless Signature Schemes
Gaurav Sharma , Suman Bala, Anil K. Verma, International Journal of Distributed Sensor Networks, Vol. 2013, Article ID 102508, 6 pages, Hindawi.
2013 Breaking the RSA based Certificateless Signature Scheme
Gaurav Sharma , Anil K. Verma, International Information Institute Journal, 16(11):7831-7836.
2013 Cryptanalysis of certificateless signature scheme
Suman Bala, Gaurav Sharma , Anil K. Verma, International Information Institute Journal, 16(11):7827-7830.
2013 Extending Certificateless Authentication for Wireless Sensor Networks: A Novel Insight
Gaurav Sharma , Suman Bala, Anil K. Verma, International Journal of Computer Science Issues, 10(6):167-172.
2013 Classification of Symmetric Key Management Schemes for Wireless Sensor Networks-Extended
Suman Bala, Gaurav Sharma , Anil K. Verma, International Journal of Security and its Applications, 7(2):117-138.
2010 Security in Wireless Sensor Networks using Frequency Hopping
Gaurav Sharma , Suman Bala, Anil K. Verma, Tej Singh, International Journal of Computer Applications, 12(6):1-6.

Conference Papers

2021 Anonymous Fair Trading on Blockchain
Gaurav Sharma , Denis Verstraeten, Olivier Markowitch, Jean-Michel Dricot, Vishal Saraswat, 3rd International Workshop on Blockchains and Smart Contracts (BSC), France, Apr 19-21 (Accepted).
2020 A novel Network-on-Chip security algorithm for tolerating Byzantine faults
Soultana Ellinidou, Gaurav Sharma , Olivier Markowitch, Jean-Michel Dricot, Guy Gogniat, The 33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Italy, Oct 19-21.
2020 Towards NoC protection of HT-Greyhole attack
Soultana Ellinidou, Gaurav Sharma , Olivier Markowitch, Jean-Michel Dricot, Guy Gogniat, International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), USA, Oct 2-4.
2019 MicroLET: A new SDNoC-based communication protocol for chipLET-based systems
Soultana Ellinidou, Gaurav Sharma , Olivier Markowitch, Sotirios Kontogiannis, Jean- Michel Dricot, Guy Gogniat, Euromicro DSD/SEAA, Chalkidiki, Greece, Aug 28-30.
2019 Identity-based TLS for Cloud of Chips
Gaurav Sharma , Soultana Ellinidou, Tristan Vanspouwen, Théo Rigas, Jean-Michel Dricot, Olivier Markowitch, 5th International Conference on Information Systems Security and Privacy (ICISSP’19), Prague, Czech Republic, Feb 23-25.
2018 A Twofold Group Key Agreement Protocol for NoC based MPSoCs
Gaurav Sharma , Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Olivier Markowitch, Jean-Michel Dricot, 16th Annual Conference on Privacy, Security and Trust (PST’18), Belfast, UK, Aug 28-30.
2018 Strong Designated Verifier Signcryption Scheme
Neetu Sharma, Rajeev Anand Sahu, Vishal Saraswat, Gaurav Sharma , Veronika Kuchta, Olivier Markowitch, ProvSec Workshop, Jeju, Rep. of Korea, Oct 25-28.
2018 Secure Communication on NoC based MPSoC
Gaurav Sharma , Soultana Ellinidou, Veronika Kuchta, Rajeev Anand Sahu, Olivier Markowitch, Jean-Michel Dricot, 14th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Singapore, Aug 8-10.
2018 Anonymous yet Traceable Strong Designated Verifier Signature
Veronika Kuchta, Rajeev Anand Sahu, Vishal Saraswat, Gaurav Sharma , Neetu Sharma, Olivier Markowitch, 21st Information Security Conference (ISC), London (Guildford), UK, Sep 09-12.
2018 A SDN Solution for System-on-Chip World
Soultana Ellinidou, Gaurav Sharma , Jean-Michel Dricot, Olivier Markowitch, 5th International Conference on Software Defined Systems (SDS), Barcelona, Spain, April 23-26.
2018 Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage
François Gerard, Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma , Olivier Markowitch, 15th International Conference on Security and Cryptography (SECRYPT), Porto, Portugal, July 26-28.
2017 Generic Framework for Attribute-Based Group Signature
Veronika Kuchta, Gaurav Sharma , Rajeev Anand Sahu, Olivier Markowitch, 13th International Conference on Information Security Practice and Experience (ISPEC’17), Melbourne, Australia, Dec 13-15.
2017 Authenticated Group Key Agreement Protocol without Pairing
Gaurav Sharma , Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala, 19th International Conference on Information and Communications Security (ICICS’17), Beijing, China, Dec 06-08.
2017 On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices
Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma , Olivier Markowitch, 20th Annual International Conference on Information Security and Cryptology (ICISC’17), Seoul, Korea, Nov 29-Dec 01.
2017 Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings
Veronika Kuchta, Gaurav Sharma , Rajeev Anand Sahu, Olivier Markowitch, 20th Annual International Conference on Information Security and Cryptology (ICISC’17), Seoul, Korea, Nov 29-Dec 01.
2017 Secure Certificateless Proxy Re-encryption without Pairing
Veronika Kuchta, Gaurav Sharma , Rajeev Anand Sahu, Tarunpreet Bhatia, Olivier Markowitch, 12th International Workshop on Security (IWSEC’17),Hiroshima, Japan, Aug 30-Sept 1.
2016 Certificateless Aggregate Signature Schemes: A Review
Pankaj Kumar, Vishnu Sharma, Gaurav Sharma , IEEE International Conference on Computing, Communication and Automation (ICCCA-2016), Greater Noida, India, Apr 29-30.
2016 A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad-Hoc Networks
Isha Dhyani, Neha Goel, Gaurav Sharma , Bhawna Mallick, International Conference on Computer, Communication and Computational Sciences(IC4S-2016), Springer, Ajmer, India, Aug 12-13.
2016 Cryptanalysis of a Certificateless Aggregate Signature Scheme
Pankaj Kumar, Vishnu Sharma, Gaurav Sharma , IEEE International Conference on Computing, Communication and Automation (ICCCA-2016), Greater Noida, India, Apr 29-30.
2016 A Study of Position Based VANET Routing Protocols
Neha Goel, Isha Dhyani, Gaurav Sharma , IEEE International Conference on Computing, Communication and Automation (ICCCA-2016), Greater Noida, India, Apr 29-30.
2016 An Acute Position based VANET Routing Protocol
Neha Goel, Isha Dhyani, Gaurav Sharma , IEEE International Conference on Micro- Electronics and Telecommunication Engineering (ICMETE-2016), Ghaziabad, India, Sep 22-23.
2012 An Identity-based Ring Signcryption Scheme
Gaurav Sharma , Suman Bala, Anil K. Verma, IT Convergence and Security-12, LNEE, 215:151-157, Springer.
2012 An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks
Suman Bala, Gaurav Sharma , Anil K. Verma, IT Convergence and Security-12, LNEE, 215:141-149, Springer.
2012 Security Frameworks for Wireless Sensor Networks - Review
Gaurav Sharma , Suman Bala, Anil K. Verma, Procedia Technology, 6:978-987, Elsevier.
2012 Optimized Elliptic Curve Cryptography for Wireless Sensor Networks Suman Bala, Gaurav Sharma , Anil K. Verma, 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC-12), pp. 89-94, Dec 6-8.
2012 Identity-based Ring Signcryption Schemes - A Review
Gaurav Sharma , Suman Bala, Anil K. Verma, FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-12), Jeju, Korea, Nov 22-25.
2012 A Survey and Taxonomy of Symmetric Key Management Schemes for Wireless Sensor Networks
Suman Bala, Gaurav Sharma , Anil K. Verma, CUBE International Information Technology Conference (CUBE-12), ACM, pp. 585-592, Sep 3-5.
2012 Security of Wireless Sensor Networks
Suman Bala, Gaurav Sharma , Youddha Beer Singh, National Conference on Recent Trends in Computer Science and Information Technology (RTCSIT-12), Echelon Institute of Technology, Faridabad, Jun 15.
2009 Comparison of Flooding and Directed Diffusion for Wireless Sensor Network
Gaurav Sharma , Suman Bala, Anil K. Verma, IEEE India Conference (INDICON-09), DAIICT, Gandhinagar, Gujrat, pp. 1-4, Dec 18-20.
2009 Routing Techniques in wireless Sensor Networks: An Overview
International Conference on Intelligent Systems andNetworks (IISN-09), Jagadhari, Feb 14-16.
2009 Simulation and Analysis of AODV protocol in Wireless Sensor Networks
Gaurav Sharma , Suman Bala, Anil K. Verma, National Conference on Information Security And Networks (ISAN-09), Chitkara University, Rajpura, Jun 19-20.