Shashank Agrawal

ORCID: 0000-0001-5668-5959
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Complexity and Algorithms in Graphs
  • Coding theory and cryptography
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • User Authentication and Security Systems
  • Kidney Stones and Urolithiasis Treatments
  • Distributed systems and fault tolerance
  • Chaos-based Image/Signal Encryption
  • Urological Disorders and Treatments
  • Advanced Authentication Protocols Security
  • Pediatric Urology and Nephrology Studies
  • Cooperative Communication and Network Coding
  • Viral-associated cancers and disorders
  • Renal Transplantation Outcomes and Treatments
  • Renal and Vascular Pathologies
  • Ureteral procedures and complications
  • Bladder and Urothelial Cancer Treatments
  • Biometric Identification and Security
  • Spam and Phishing Detection
  • Urinary and Genital Oncology Studies
  • Security and Verification in Computing
  • AI in cancer detection
  • Prostate Cancer Diagnosis and Treatment

Amrita Institute of Medical Sciences and Research Centre
2023-2025

Icahn School of Medicine at Mount Sinai
2025

Muljibhai Patel Urological Hospital
2020-2024

Jawaharlal Nehru Medical College
2023-2024

Datta Meghe Institute of Medical Sciences
2024

Government Medical College
2021-2022

Government Medical College and Hospital
2022

Indian Institute of Technology Indore
2021-2022

Christie's
2021

Western Digital (United States)
2020-2021

Time and again, attribute-based encryption has been shown to be the natural cryptographic tool for building various types of conditional access systems with far-reaching applications, but deployment such very slow. A central issue is lack an scheme that can operate on sensitive data efficiently and, at same time, provides features are important in practice.

10.1145/3133956.3134014 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2017-10-27

Recently, the Prostate Imaging Reporting and Data System - 3 lesions (PI-RADS 3) have been sub classified into "3a" with a volume of <0.5 mL "3b" exceeding 0.5 mL, whereas prostate-specific antigen density (PSAD) is an established adjunct tool for predicting clinically significant prostate cancer (csPCa). The objective this study was to evaluate association between PI-RADS PSAD in diagnosing csPCa assess sensitivity, specificity, negative predictive value (NPV), positive (PPV) when combined...

10.4103/iju.iju_112_24 article EN cc-by-nc-sa Indian Journal of Urology 2025-01-01

Despite level 1 evidence supporting neoadjuvant chemotherapy (NACT) followed by radical cystectomy (RC) for muscle-invasive bladder cancer (MIBC), its adoption is hindered concerns about toxicity and detrimental impact on post-RC complications. We retrospectively reviewed complications at a tertiary care hospital, particularly assessing of NACT. Data from the institutional database were retrieved patients aged ≥18 with MIBC (≥American Joint Committee Cancer Clinical Stage T2), treated RC...

10.4103/iju.iju_217_24 article EN cc-by-nc-sa Indian Journal of Urology 2025-01-01

ABSTRACT We report our experience with nephron-sparing surgery for a completely endophytic small renal mass in an allograft kidney. A 37-year-old female, 14 years post live-related transplant end-stage disease due to crescentic glomerulonephritis, presented 3.6 cm mass. She underwent open partial nephrectomy and was discharged on the 5 th postoperative day. Six months postsurgery, she showed excellent graft function no tumor recurrence. Nephron-sparing of kidney presents challenges regarding...

10.4103/iju.iju_135_24 article EN cc-by-nc-sa Indian Journal of Urology 2025-01-29

Motivated by privacy and usability requirements in various scenarios where existing cryptographic tools (like secure multi-party computation functional encryption) are not adequate, we introduce a new tool called Controlled Functional Encryption (C-FE). As encryption, C-FE allows user (client) to learn only certain functions of encrypted data, using keys obtained from an authority. However, allow (and require) the client send fresh key request authority every time it wants evaluate function...

10.1145/2660267.2660291 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

Token-based authentication is commonly used to enable a single-sign-on experience on the web, in mobile applications and enterprise networks using wide range of open standards network protocols: clients sign an identity provider their username/password obtain cryptographic token generated with master secret key, store for future accesses various services applications. The server(s) are single point failures that if breached, attackers forge arbitrary tokens or mount offline dictionary...

10.1145/3243734.3243839 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

Abstract In the last decade, public health problem is primary consciousness worldwide, and cancer especially central issue. Further, skin comes in top‐3 of world's most common cancer. We have proposed an efficient convolutional neural network (CNN) model that identifies problems accurately. Although dataset HAM10K used for classification problem, its samples each class are highly imbalanced therefore accountable lower training accuracy. The AlexNet customized data to address this problem....

10.1002/ima.22616 article EN International Journal of Imaging Systems and Technology 2021-06-21

Background: There is a need to reliably render urolithiasis patients completely stone free with minimal morbidity. We report on the initial safety and feasibility steerable ureteroscopic renal evacuation (SURE) in prospective study using basket extraction as comparison. Materials Methods: A pilot randomized controlled was conducted comparing SURE postlaser lithotripsy. performed CVAC™ Aspiration System, catheter (with introducer). The of steering CVAC throughout collecting system under...

10.1089/end.2021.0759 article EN cc-by Journal of Endourology 2022-03-25

Abstract Chondrosarcomas are the second-most common bone tumors and known to occur in pelvis. However, invasion into urinary bladder is rare. We report a rare case of primary chondrosarcoma invading prostate requiring wide excision with cystoprostatectomy reconstruction. On initial evaluation, 48-year-old male patient presented obstructive lower tract symptoms was suspected have mass. He underwent transurethral resection biopsy mass at an outside hospital which showed features...

10.4103/jasu.jasu_28_24 article EN Journal of the Association of Southern Urologists. 2025-01-01

Threshold cryptography provides a mechanism for protecting secret keys by sharing them among multiple parties, who then jointly perform cryptographic operations. An attacker corrupts up to threshold number of parties cannot recover the secrets or violate security. Prior works in this space have mostly focused on definitions and constructions public-key digital signatures, thus do not capture security concerns efficiency challenges symmetric-key based applications which commonly use long-term...

10.1145/3243734.3243774 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

This paper presents Internet of Things in a wider context. Main enabling factor this concept is the integration various technologies. In paper, we describe key technologies involved implementation and major application domain where will play vital role. Later discuss about open issues which are to be addressed before worldwide acceptance these There lots address. Here address most relevant among them detail.

10.5752/10.5752/p.2316-9451.2013v1n2p78 article EN cc-by Abakós 2013-05-30
Coming Soon ...