|
Search the dblp DataBase
Ved Prakash Gulati:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- V. Radha, Ved Prakash Gulati, Arun K. Pujari
A Balanced Multicast Overlay Protocol - Appcast. [Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:307-312 [Conf]
- N. Rajendran, K. Yugandhar, S. Albert Rabara, Ved Prakash Gulati
Modeling and Performance study of MPLS VPN. [Citation Graph (0, 0)][DBLP] Communications in Computing, 2005, pp:91-98 [Conf]
- A. R. Dani, Arun K. Pujari, Ved Prakash Gulati
Continuous Call Double Auctions with Indivisibility Constraints. [Citation Graph (0, 0)][DBLP] EEE, 2005, pp:32-37 [Conf]
- V. Radha, Ved Prakash Gulati, Arun K. Pujari
Appcast - A Low Stress and High Stretch Overlay Protocol. [Citation Graph (0, 0)][DBLP] GCC (2), 2003, pp:360-371 [Conf]
- A. R. Dani, Ved Prakash Gulati, Arun K. Pujari
Auction Based System for Electronic Commerce Transaction. [Citation Graph (0, 0)][DBLP] ICEIS (4), 2005, pp:16-23 [Conf]
- A. R. Dani, Ved Prakash Gulati, Arun K. Pujari
Design of Continuous Call Market with Assignment Constraints. [Citation Graph (0, 0)][DBLP] ICEIS (4), 2005, pp:182-187 [Conf]
- V. Radha, Ved Prakash Gulati, N. Hemanth Kumar
Securing the Enterprise Database. [Citation Graph (0, 0)][DBLP] ICEIS (1), 2005, pp:76-83 [Conf]
- N. Rajendran, K. Yugandhar, Ved Prakash Gulati, S. Albert Rabara
MPLS Architecture for Service Provider. [Citation Graph (0, 0)][DBLP] ICETE (2), 2004, pp:183-190 [Conf]
- V. Radha, Ved Prakash Gulati, Rajesh Thapar
Evolution of Web Services Approach in SFMS - A Case Study. [Citation Graph (0, 0)][DBLP] ICWS, 2004, pp:640-647 [Conf]
- Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati, N. Rajendran
Modeling and Performance Evaluation of Security Architecture for Wireless Local Area Networks. [Citation Graph (0, 0)][DBLP] International Conference on Computational Intelligence, 2004, pp:369-374 [Conf]
- Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati
Reed Solomon Codes for Digital Fingerprinting. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:163-175 [Conf]
- Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:25-35 [Conf]
- Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:674-678 [Conf]
- V. Radha, Ved Prakash Gulati, Arun K. Pujari
Efficient Multicast E-Services Over APPCAST. [Citation Graph (0, 0)][DBLP] ITCC (2), 2004, pp:331-336 [Conf]
- Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari
On Gossip Codes and Traceability Schemes. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:772-777 [Conf]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
A Novel Remote User Authentication Scheme Through Dynamic Login Identity. [Citation Graph (0, 0)][DBLP] IWDC, 2004, pp:532- [Conf]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
Cryptanalysis and Improvement of a Multisignature Scheme. [Citation Graph (0, 0)][DBLP] IWDC, 2005, pp:398-403 [Conf]
- Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
ID-based Serial Multisignature Scheme using Bilinear Pairings. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:40-47 [Conf]
- A. R. Dani, Arun K. Pujari, Ved Prakash Gulati
Multi Unit Auctions with Constraints in Financial Domain. [Citation Graph (0, 0)][DBLP] CEC/EEE, 2006, pp:17- [Conf]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
A novel remote user authentication scheme using bilinear pairings. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:184-189 [Journal]
- Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:215-228 [Journal]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
An Efficient Proxy Signature Scheme with Revocation. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2004, v:15, n:4, pp:455-464 [Journal]
- Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. [Citation Graph (0, 0)][DBLP] J. UCS, 2005, v:11, n:1, pp:122-149 [Journal]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
Hierarchical key management scheme using polynomial interpolation. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2005, v:39, n:1, pp:40-47 [Journal]
- Sanjay Rawat, Ved Prakash Gulati, Arun K. Pujari
A Fast Host-Based Intrusion Detection System Using Rough Set Theory. [Citation Graph (0, 0)][DBLP] , 2005, v:, n:, pp:144-161 [Journal]
- A. R. Dani, Arun K. Pujari, Ved Prakash Gulati
Strategy proof electronic markets. [Citation Graph (0, 0)][DBLP] ICEC, 2007, pp:45-54 [Conf]
- A. R. Dani, Ved Prakash Gulati
A framework for modeling automated negotiation. [Citation Graph (0, 0)][DBLP] IASTED Conf. on Software Engineering and Applications, 2004, pp:418-423 [Conf]
- Challa S. Sastry, Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati
Network traffic analysis using singular value decomposition and multiscale transforms. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:23, pp:5275-5291 [Journal]
Strategy Proof Electronic Markets. [Citation Graph (, )][DBLP]
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing [Citation Graph (, )][DBLP]
A Dynamic ID-based Remote User Authentication Scheme [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.303secs
|