Follow
Sweta Mishra
Sweta Mishra
Assistant Professor, Shiv Nadar University
Verified email at snu.edu.in - Homepage
Title
Cited by
Cited by
Year
Cancelable multi-biometric approach using fuzzy extractor and novel bit-wise encryption
D Chang, S Garg, M Hasan, S Mishra
IEEE Transactions on Information Forensics and Security 15, 3152-3167, 2020
582020
Generation of secure and reliable honeywords, preventing false detection
D Chang, A Goel, S Mishra, SK Sanadhya
IEEE Transactions on Dependable and Secure Computing 16 (5), 757-769, 2018
272018
Rig: A Simple, Secure and Flexible Design for Password Hashing
D Chang, A Jati, S Mishra, SK Sanadhya
Information Security and Cryptology: 10th International Conference, Inscrypt …, 2015
182015
XHX–a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing
A Jha, E List, K Minematsu, S Mishra, M Nandi
Progress in Cryptology–LATINCRYPT 2017: 5th International Conference on …, 2019
162019
Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach
A Agarwal, A Prasad, R Rustogi, S Mishra
Journal of Information Security and Applications 56, 102672, 2021
142021
Cryptanalytic time–memory trade-off for password hashing schemes
D Chang, A Jati, S Mishra, SK Sanadhya
International Journal of Information Security 18 (2), 163-180, 2019
102019
On making U2F protocol leakage-resilient via re-keying
D Chang, S Mishra, SK Sanadhya, AP Singh
Cryptology ePrint Archive, 2017
102017
TMPS: ticket-mediated password strengthening
J Kelsey, D Dachman-Soled, S Mishra, MS Turan
Cryptographers’ Track at the RSA Conference, 225-253, 2020
42020
Design and analysis of password-based authentication systems
S Mishra, D Chang, SK Sanadhya
IIIT-Delhi, 2017
22017
Cryptographic module based approach for password hashing schemes
D Chang, A Jati, S Mishra, SK Sanadhya
Technology and Practice of Passwords: International Conference on Passwords …, 2015
22015
Detection of Password Reuse and Credential Stuffing: A Server-side Approach
SS Konduru, S Mishra
Cryptology ePrint Archive, 2023
12023
On Security of Fuzzy Commitment Scheme for Biometric Authentication
D Chang, S Garg, M Hasan, S Mishra
Australasian Conference on Information Security and Privacy, 399-419, 2022
12022
Performance analysis of some password hashing schemes
D Chang, A Jati, S Mishra, SK Sanadhya
Cryptology ePrint Archive, 2015
12015
Security Analysis of Password-based Authenticated Key Exchange Protocols
A Mishra, S Mishra, S Panday
2024
A Security Analysis of Password Managers on Android
A Sharma, S Mishra
International Conference on Information Systems Security, 3-22, 2023
2023
Generation of Secure and Reliable Honeywords, Preventing False Detection
SK Sanadhya, S Mishra, D Chang, A Goel
2022
Cryptanalytic time–memory trade-off for password hashing schemes
A Jati, S Mishra, SK Sanadhya, D Chang
2021
Rig: A simple, secure and flexible design for Password Hashing Version 2.0
D Chang, A Jati, S Mishra, SK Sanadhya
2014
The system can't perform the operation now. Try again later.
Articles 1–18