|
Search the dblp DataBase
Deepak B. Phatak:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sunil Sayyaparaju, Deepak B. Phatak
XML Agent on Smart Cards. [Citation Graph (0, 0)][DBLP] CARDIS, 2004, pp:303-316 [Conf]
- Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati, N. Rajendran
Modeling and Performance Evaluation of Security Architecture for Wireless Local Area Networks. [Citation Graph (0, 0)][DBLP] International Conference on Computational Intelligence, 2004, pp:369-374 [Conf]
- Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:25-35 [Conf]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
A novel remote user authentication scheme using bilinear pairings. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:3, pp:184-189 [Journal]
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
Hierarchical key management scheme using polynomial interpolation. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2005, v:39, n:1, pp:40-47 [Journal]
- Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
Algorithms and Approaches of Proxy Signature: A Survey [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|