ASC-1: an authenticated encryption stream cipher G Jakimoski, S Khajuria Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012 | 32 | 2012 |
Implementation of diffie-Hellman key exchange on wireless sensor using elliptic curve cryptography S Khajuria, H Tange 2009 1st International Conference on Wireless Communication, Vehicular …, 2009 | 25 | 2009 |
5G visions of user privacy LT Sorensen, S Khajuria, KE Skouby 2015 IEEE 81st vehicular technology conference (VTC Spring), 1-4, 2015 | 12 | 2015 |
Cybersecurity and Privacy-Bridging the Gap S Khajuria, L Sørensen, KE Skouby River Publishers, 2017 | 10 | 2017 |
Millennial Users in a 5G context LT Sørensen, I Williams, S Khajuria, KE Skouby Wireless World Research Forum outlook series, 1-15, 2017 | 7 | 2017 |
User privacy and empowerment: trends, challenges, and opportunities PS Dhotre, H Olesen, S Khajuria Intelligent Computing and Information and Communication: Proceedings of 2nd …, 2018 | 6 | 2018 |
Privacy and Economics in a 5G Environment S Khajuria, KE Skouby Wireless Personal Communications 95, 145-154, 2017 | 5 | 2017 |
“Take It or Leave It”: Effective Visualization of Privacy Policies PS Dhotre, A Bihani, S Khajuria, H Olesen Cybersecurity and Privacy-Bridging the Gap, 39-64, 2022 | 4 | 2022 |
Interpretation and analysis of privacy policies of websites in India PS Dhotre, H Olesen, S Khajuria | 4 | 2016 |
Accessing and disclosing protected resources: A user-centric view H Olesen, S Khajuria 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 1-5, 2015 | 4 | 2015 |
Where Does My Private Data Go?: Visualization of Users’ Privacy S Khajuria, LT Sørensen Where Does My Private Data Go?: Visualization of Users’ Privacy, 2015 | 4 | 2015 |
Implementation of general data protection regulation (gdpr) in enterprises S Khajuria, LT Sørensen, KE Skouby Wireless World Research Forum 38:" 5G–Enabling the Connected Society", 2017 | 3 | 2017 |
Privacy for Sale?: Analysis of Online User Privacy LT Sørensen, JK Sørensen, S Khajuria | 2 | 2015 |
Authenticated Encryption for Low-Power Reconfigurable Wireless Devices‖ S Khajuria, B Andersen Journal of Cyber Security and Mobility 1, 189-203, 2012 | 2 | 2012 |
ATHiCC: An Anonymous, Asynchronous, Serverless Instant Messaging Protocol D Balchasan, M Ozaniak, Y Schwartz, NS Steffensen, S Khajuria, ... | 1 | 2019 |
Introduction to the Minitrack on Privacy, 5G and Economics KE Skouby, L Sorensen, S Khajuria | 1 | 2018 |
A Novel Single Pass Authenticated Encryption Stream Cipher for Software Defined Radios S Khajuria | 1 | 2012 |
Introduction to the Minitrack on Privacy and Economics L Sørensen, S Khajuria, K Skouby | | 2021 |
Privacy and Economics An introduction to the mini-track at HICSS’54 2021 KE Skouby, L Sørensen, S Khajuria 54th Annual Hawaii International Conference on System Sciences, HICSS 2021 …, 2021 | | 2021 |
Introduction to the Minitrack on Privacy and Economics S Khajuria, L Sørensen, K Skouby | | 2020 |