|
Search the dblp DataBase
Kapali Viswanathan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:407-420 [Conf]
- Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson
Key Recovery System for the Commercial Environment. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:149-162 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
A Three Phased Schema for Sealed Bid Auction System Design. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:412-426 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Publicly Verifiable Key Escrow with Limited Time Span. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:36-50 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
Five Sealed-bid Auction Models. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2003, pp:77-86 [Conf]
- Riza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan
Secure e-Voting for Preferential Elections. [Citation Graph (0, 0)][DBLP] EGOV, 2003, pp:246-249 [Conf]
- Colin Boyd, Kapali Viswanathan
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. [Citation Graph (0, 0)][DBLP] FASec, 2002, pp:49-61 [Conf]
- Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan
Denial of Service Issues in Voice Over IP Networks. [Citation Graph (0, 0)][DBLP] ICETE (2), 2004, pp:230-237 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:147-159 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Signature Scheme for Controlled Environments. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:119-134 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
Non-interactive Auction Schemewith Strong Privacy. [Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:407-420 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Secure Selection Protocols. [Citation Graph (0, 0)][DBLP] ICISC, 1999, pp:132-146 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Strong Binding for Software Key Escrow. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 1999, pp:134-139 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
An Analysis of Integrity Services in Protocols. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:175-187 [Conf]
- Kapali Viswanathan, Ashutosh Saxena
Towards Logically and Physically Secure Public-Key Infrastructures. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:122-134 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Hybrid Key Escrow: A New Paradigm. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:1, pp:77-92 [Journal]
- Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson
Key recovery for the commercial environment. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal]
- Ed Dawson, Kapali Viswanathan, Colin Boyd
Compliant cryptologic protocols. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:3, pp:189-202 [Journal]
Detecting modifications in paper documents: a coding approach. [Citation Graph (, )][DBLP]
NLHB : A Non-Linear Hopper Blum Protocol [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|