|
Search the dblp DataBase
Manik Lal Das:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Manik Lal Das, Ashutosh Saxena
SPAM: Secure Protocol for Authentication in Mobile-Communications. [Citation Graph (0, 0)][DBLP] ICMB, 2005, pp:23-27 [Conf]
- Ashutosh Saxena, Manik Lal Das, Anurag Gupta
MMPS: A Versatile Mobile-to-Mobile Payment System. [Citation Graph (0, 0)][DBLP] ICMB, 2005, pp:400-405 [Conf]
- Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:674-678 [Conf]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
A Novel Remote User Authentication Scheme Through Dynamic Login Identity. [Citation Graph (0, 0)][DBLP] IWDC, 2004, pp:532- [Conf]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
Cryptanalysis and Improvement of a Multisignature Scheme. [Citation Graph (0, 0)][DBLP] IWDC, 2005, pp:398-403 [Conf]
- Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
ID-based Serial Multisignature Scheme using Bilinear Pairings. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:40-47 [Conf]
- M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena
An Effective Certificateless Signature Scheme Based on Bilinear Pairings. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:31-39 [Conf]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
A novel remote user authentication scheme using bilinear pairings. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:184-189 [Journal]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
An Efficient Proxy Signature Scheme with Revocation. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2004, v:15, n:4, pp:455-464 [Journal]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
Hierarchical key management scheme using polynomial interpolation. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2005, v:39, n:1, pp:40-47 [Journal]
- Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
Algorithms and Approaches of Proxy Signature: A Survey [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena
Identity Based Multisignatures. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2006, v:17, n:2, pp:177-186 [Journal]
Revisiting Bluetooth Security (Short Paper). [Citation Graph (, )][DBLP]
EARS: Efficient Entity Authentication in Remote Systems. [Citation Graph (, )][DBLP]
Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. [Citation Graph (, )][DBLP]
Efficient user authentication and secure data transmission in wireless sensor networks. [Citation Graph (, )][DBLP]
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems [Citation Graph (, )][DBLP]
A Dynamic ID-based Remote User Authentication Scheme [Citation Graph (, )][DBLP]
Comments on "Improved Efficient Remote User Authentication Schemes" [Citation Graph (, )][DBLP]
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [Citation Graph (, )][DBLP]
A Flexible and Secure Remote Systems Authentication Scheme Using Smart Cards [Citation Graph (, )][DBLP]
On the Security of ``an efficient and complete remote user authentication scheme'' [Citation Graph (, )][DBLP]
Comment - Practical Data Protection [Citation Graph (, )][DBLP]
GSM Security Using Identity-based Cryptography [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|