The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Deepak B. Phatak: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sunil Sayyaparaju, Deepak B. Phatak
    XML Agent on Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:303-316 [Conf]
  2. Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati, N. Rajendran
    Modeling and Performance Evaluation of Security Architecture for Wireless Local Area Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Intelligence, 2004, pp:369-374 [Conf]
  3. Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati
    Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:25-35 [Conf]
  4. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
    A novel remote user authentication scheme using bilinear pairings. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:184-189 [Journal]
  5. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
    Hierarchical key management scheme using polynomial interpolation. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:40-47 [Journal]
  6. Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
    Algorithms and Approaches of Proxy Signature: A Survey [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  7. Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002