The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sarvar Patel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
    Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:599-613 [Conf]
  2. Mark Etzel, Sarvar Patel, Zulfikar Ramzan
    SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:234-251 [Conf]
  3. Sarvar Patel, Ganapathy S. Sundaram
    An Efficient Discrete Log Pseudo Random Generator. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:304-317 [Conf]
  4. Philip D. MacKenzie, Sarvar Patel
    Hard Bits of the Discrete Log with Applications to Password Authentication. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:209-226 [Conf]
  5. Victor Boyko, Philip D. MacKenzie, Sarvar Patel
    Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:156-171 [Conf]
  6. Daniel Bleichenbacher, Sarvar Patel
    SOBER Crytanalysis. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:305-316 [Conf]
  7. Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
    Towards Making Luby-Rackoff Ciphers Optimal and Practical. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:171-185 [Conf]
  8. Niranjan Joshi, Srinivas R. Kadaba, Sarvar Patel, Ganapathy S. Sundaram
    Downlink scheduling in CDMA data networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2000, pp:179-190 [Conf]
  9. Sarvar Patel
    An Efficient MAC for Short Messages. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:353-368 [Conf]
  10. Sarvar Patel
    Over the Air Service Provisioning. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:174-189 [Conf]
  11. Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
    Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:271-290 [Conf]
  12. Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
    Efficient Constructions of Variable-Input-Length Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:326-340 [Conf]
  13. Sarvar Patel
    Number Theoretic Attacks on Secure Password Schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:236-247 [Conf]
  14. Uri Blumenthal, Milind M. Buddhikot, Juan A. Garay, Scott C. Miller, Sarvar Patel, Luca Salgarelli, Dorothy Stanley
    A scheme for authentication and dynamic key exchange in wireless networks. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2002, v:7, n:2, pp:37-48 [Journal]
  15. Uri Blumenthal, Michael Marcovici, Semyon Mizikovsky, Sarvar Patel, Ganapathy S. Sundaram, Marcus Wong
    Wireless network security architecture. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2002, v:7, n:2, pp:19-36 [Journal]
  16. Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
    Security for wireless internet access. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2001, v:6, n:2, pp:74-83 [Journal]

Search in 0.033secs, Finished in 0.034secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002