The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kapali Viswanathan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan
    Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:407-420 [Conf]
  2. Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson
    Key Recovery System for the Commercial Environment. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:149-162 [Conf]
  3. Kapali Viswanathan, Colin Boyd, Ed Dawson
    A Three Phased Schema for Sealed Bid Auction System Design. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:412-426 [Conf]
  4. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Publicly Verifiable Key Escrow with Limited Time Span. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:36-50 [Conf]
  5. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Five Sealed-bid Auction Models. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:77-86 [Conf]
  6. Riza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Secure e-Voting for Preferential Elections. [Citation Graph (0, 0)][DBLP]
    EGOV, 2003, pp:246-249 [Conf]
  7. Colin Boyd, Kapali Viswanathan
    Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:49-61 [Conf]
  8. Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan
    Denial of Service Issues in Voice Over IP Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:230-237 [Conf]
  9. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:147-159 [Conf]
  10. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Signature Scheme for Controlled Environments. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:119-134 [Conf]
  11. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Non-interactive Auction Schemewith Strong Privacy. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:407-420 [Conf]
  12. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Secure Selection Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:132-146 [Conf]
  13. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Strong Binding for Software Key Escrow. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:134-139 [Conf]
  14. Kapali Viswanathan, Colin Boyd, Ed Dawson
    An Analysis of Integrity Services in Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:175-187 [Conf]
  15. Kapali Viswanathan, Ashutosh Saxena
    Towards Logically and Physically Secure Public-Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:122-134 [Conf]
  16. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Hybrid Key Escrow: A New Paradigm. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:1, pp:77-92 [Journal]
  17. Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson
    Key recovery for the commercial environment. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal]
  18. Ed Dawson, Kapali Viswanathan, Colin Boyd
    Compliant cryptologic protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:189-202 [Journal]

  19. Detecting modifications in paper documents: a coding approach. [Citation Graph (, )][DBLP]


  20. NLHB : A Non-Linear Hopper Blum Protocol [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002