The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ved Prakash Gulati: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. V. Radha, Ved Prakash Gulati, Arun K. Pujari
    A Balanced Multicast Overlay Protocol - Appcast. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:307-312 [Conf]
  2. N. Rajendran, K. Yugandhar, S. Albert Rabara, Ved Prakash Gulati
    Modeling and Performance study of MPLS VPN. [Citation Graph (0, 0)][DBLP]
    Communications in Computing, 2005, pp:91-98 [Conf]
  3. A. R. Dani, Arun K. Pujari, Ved Prakash Gulati
    Continuous Call Double Auctions with Indivisibility Constraints. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:32-37 [Conf]
  4. V. Radha, Ved Prakash Gulati, Arun K. Pujari
    Appcast - A Low Stress and High Stretch Overlay Protocol. [Citation Graph (0, 0)][DBLP]
    GCC (2), 2003, pp:360-371 [Conf]
  5. A. R. Dani, Ved Prakash Gulati, Arun K. Pujari
    Auction Based System for Electronic Commerce Transaction. [Citation Graph (0, 0)][DBLP]
    ICEIS (4), 2005, pp:16-23 [Conf]
  6. A. R. Dani, Ved Prakash Gulati, Arun K. Pujari
    Design of Continuous Call Market with Assignment Constraints. [Citation Graph (0, 0)][DBLP]
    ICEIS (4), 2005, pp:182-187 [Conf]
  7. V. Radha, Ved Prakash Gulati, N. Hemanth Kumar
    Securing the Enterprise Database. [Citation Graph (0, 0)][DBLP]
    ICEIS (1), 2005, pp:76-83 [Conf]
  8. N. Rajendran, K. Yugandhar, Ved Prakash Gulati, S. Albert Rabara
    MPLS Architecture for Service Provider. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:183-190 [Conf]
  9. V. Radha, Ved Prakash Gulati, Rajesh Thapar
    Evolution of Web Services Approach in SFMS - A Case Study. [Citation Graph (0, 0)][DBLP]
    ICWS, 2004, pp:640-647 [Conf]
  10. Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati, N. Rajendran
    Modeling and Performance Evaluation of Security Architecture for Wireless Local Area Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Intelligence, 2004, pp:369-374 [Conf]
  11. Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati
    Reed Solomon Codes for Digital Fingerprinting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:163-175 [Conf]
  12. Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati
    Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:25-35 [Conf]
  13. Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:674-678 [Conf]
  14. V. Radha, Ved Prakash Gulati, Arun K. Pujari
    Efficient Multicast E-Services Over APPCAST. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:331-336 [Conf]
  15. Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari
    On Gossip Codes and Traceability Schemes. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:772-777 [Conf]
  16. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    A Novel Remote User Authentication Scheme Through Dynamic Login Identity. [Citation Graph (0, 0)][DBLP]
    IWDC, 2004, pp:532- [Conf]
  17. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    Cryptanalysis and Improvement of a Multisignature Scheme. [Citation Graph (0, 0)][DBLP]
    IWDC, 2005, pp:398-403 [Conf]
  18. Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    ID-based Serial Multisignature Scheme using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:40-47 [Conf]
  19. A. R. Dani, Arun K. Pujari, Ved Prakash Gulati
    Multi Unit Auctions with Constraints in Financial Domain. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2006, pp:17- [Conf]
  20. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
    A novel remote user authentication scheme using bilinear pairings. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:184-189 [Journal]
  21. Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati
    On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:215-228 [Journal]
  22. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    An Efficient Proxy Signature Scheme with Revocation. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2004, v:15, n:4, pp:455-464 [Journal]
  23. Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari
    Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:122-149 [Journal]
  24. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
    Hierarchical key management scheme using polynomial interpolation. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:40-47 [Journal]
  25. Sanjay Rawat, Ved Prakash Gulati, Arun K. Pujari
    A Fast Host-Based Intrusion Detection System Using Rough Set Theory. [Citation Graph (0, 0)][DBLP]
    , 2005, v:, n:, pp:144-161 [Journal]
  26. A. R. Dani, Arun K. Pujari, Ved Prakash Gulati
    Strategy proof electronic markets. [Citation Graph (0, 0)][DBLP]
    ICEC, 2007, pp:45-54 [Conf]
  27. A. R. Dani, Ved Prakash Gulati
    A framework for modeling automated negotiation. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:418-423 [Conf]
  28. Challa S. Sastry, Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati
    Network traffic analysis using singular value decomposition and multiscale transforms. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:23, pp:5275-5291 [Journal]

  29. Strategy Proof Electronic Markets. [Citation Graph (, )][DBLP]


  30. Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing [Citation Graph (, )][DBLP]


  31. A Dynamic ID-based Remote User Authentication Scheme [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002