The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Manik Lal Das: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Manik Lal Das, Ashutosh Saxena
    SPAM: Secure Protocol for Authentication in Mobile-Communications. [Citation Graph (0, 0)][DBLP]
    ICMB, 2005, pp:23-27 [Conf]
  2. Ashutosh Saxena, Manik Lal Das, Anurag Gupta
    MMPS: A Versatile Mobile-to-Mobile Payment System. [Citation Graph (0, 0)][DBLP]
    ICMB, 2005, pp:400-405 [Conf]
  3. Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:674-678 [Conf]
  4. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    A Novel Remote User Authentication Scheme Through Dynamic Login Identity. [Citation Graph (0, 0)][DBLP]
    IWDC, 2004, pp:532- [Conf]
  5. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    Cryptanalysis and Improvement of a Multisignature Scheme. [Citation Graph (0, 0)][DBLP]
    IWDC, 2005, pp:398-403 [Conf]
  6. Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    ID-based Serial Multisignature Scheme using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:40-47 [Conf]
  7. M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena
    An Effective Certificateless Signature Scheme Based on Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:31-39 [Conf]
  8. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
    A novel remote user authentication scheme using bilinear pairings. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:184-189 [Journal]
  9. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    An Efficient Proxy Signature Scheme with Revocation. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2004, v:15, n:4, pp:455-464 [Journal]
  10. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
    Hierarchical key management scheme using polynomial interpolation. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:40-47 [Journal]
  11. Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
    Algorithms and Approaches of Proxy Signature: A Survey [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  12. Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena
    Identity Based Multisignatures. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2006, v:17, n:2, pp:177-186 [Journal]

  13. Revisiting Bluetooth Security (Short Paper). [Citation Graph (, )][DBLP]


  14. EARS: Efficient Entity Authentication in Remote Systems. [Citation Graph (, )][DBLP]


  15. Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. [Citation Graph (, )][DBLP]


  16. Efficient user authentication and secure data transmission in wireless sensor networks. [Citation Graph (, )][DBLP]


  17. Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems [Citation Graph (, )][DBLP]


  18. A Dynamic ID-based Remote User Authentication Scheme [Citation Graph (, )][DBLP]


  19. Comments on "Improved Efficient Remote User Authentication Schemes" [Citation Graph (, )][DBLP]


  20. Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [Citation Graph (, )][DBLP]


  21. A Flexible and Secure Remote Systems Authentication Scheme Using Smart Cards [Citation Graph (, )][DBLP]


  22. On the Security of ``an efficient and complete remote user authentication scheme'' [Citation Graph (, )][DBLP]


  23. Comment - Practical Data Protection [Citation Graph (, )][DBLP]


  24. GSM Security Using Identity-based Cryptography [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002