The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ashutosh Saxena: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. M. Choudary Gorantla, Ashutosh Saxena
    An Efficient Certificateless Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:110-116 [Conf]
  2. Sadybakasov Ulanbek, Ashutosh Saxena, Atul Negi
    On Reduction of Bootstrapping Information Using Digital Multisignature. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:198-204 [Conf]
  3. G. Shailaja, K. Phani Kumar, Ashutosh Saxena
    Universal Designated Multi Verifier Signature without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:168-171 [Conf]
  4. M. Choudary Gorantla, Ashutosh Saxena
    Verifiably Encrypted Signature Scheme Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2005, pp:357-363 [Conf]
  5. Manik Lal Das, Ashutosh Saxena
    SPAM: Secure Protocol for Authentication in Mobile-Communications. [Citation Graph (0, 0)][DBLP]
    ICMB, 2005, pp:23-27 [Conf]
  6. Ashutosh Saxena, Manik Lal Das, Anurag Gupta
    MMPS: A Versatile Mobile-to-Mobile Payment System. [Citation Graph (0, 0)][DBLP]
    ICMB, 2005, pp:400-405 [Conf]
  7. K. Phani Kumar, G. Shailaja, A. Kavitha, Ashutosh Saxena
    Mutual Authentication and Key Agreement for GSM. [Citation Graph (0, 0)][DBLP]
    ICMB, 2006, pp:25- [Conf]
  8. Jeff Michels, Ashutosh Saxena, Andrew Y. Ng
    High speed obstacle avoidance using monocular vision and reinforcement learning. [Citation Graph (0, 0)][DBLP]
    ICML, 2005, pp:593-600 [Conf]
  9. Ashutosh Saxena, Abhinav Gupta, Amitabha Mukerjee
    Non-linear Dimensionality Reduction by Locally Linear Isomaps. [Citation Graph (0, 0)][DBLP]
    ICONIP, 2004, pp:1038-1043 [Conf]
  10. Ashutosh Saxena, Jamie Schulte, Andrew Y. Ng
    Depth Estimation Using Monocular and Stereo Cues. [Citation Graph (0, 0)][DBLP]
    IJCAI, 2007, pp:2197-2203 [Conf]
  11. Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati
    Reed Solomon Codes for Digital Fingerprinting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:163-175 [Conf]
  12. Kapali Viswanathan, Ashutosh Saxena
    Towards Logically and Physically Secure Public-Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:122-134 [Conf]
  13. Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:674-678 [Conf]
  14. Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari
    On Gossip Codes and Traceability Schemes. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:772-777 [Conf]
  15. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    A Novel Remote User Authentication Scheme Through Dynamic Login Identity. [Citation Graph (0, 0)][DBLP]
    IWDC, 2004, pp:532- [Conf]
  16. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    Cryptanalysis and Improvement of a Multisignature Scheme. [Citation Graph (0, 0)][DBLP]
    IWDC, 2005, pp:398-403 [Conf]
  17. Ashutosh Saxena, Gaurav Gupta, Vadim Gerasimov, Sébastien Ourselin
    In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:595-601 [Conf]
  18. Ashutosh Saxena, Sung H. Chung, Andrew Y. Ng
    Learning Depth from Single Monocular Images. [Citation Graph (0, 0)][DBLP]
    NIPS, 2005, pp:- [Conf]
  19. Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    ID-based Serial Multisignature Scheme using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:40-47 [Conf]
  20. M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena
    An Effective Certificateless Signature Scheme Based on Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:31-39 [Conf]
  21. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
    A novel remote user authentication scheme using bilinear pairings. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:184-189 [Journal]
  22. Ashutosh Saxena, Suju M. George, P. Rambabu
    Interconnection Wire-Length Estimation in VLSI Standard Cell Placement Via Neural Network. [Citation Graph (0, 0)][DBLP]
    International Journal on Artificial Intelligence Tools, 1998, v:7, n:4, pp:443-451 [Journal]
  23. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    An Efficient Proxy Signature Scheme with Revocation. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2004, v:15, n:4, pp:455-464 [Journal]
  24. Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari
    Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:122-149 [Journal]
  25. Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak
    Hierarchical key management scheme using polynomial interpolation. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:40-47 [Journal]
  26. Ashutosh Saxena, Justin Driemeyer, Justin Kearns, Andrew Y. Ng
    Robotic Grasping of Novel Objects. [Citation Graph (0, 0)][DBLP]
    NIPS, 2006, pp:1209-1216 [Conf]
  27. Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak
    Algorithms and Approaches of Proxy Signature: A Survey [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  28. Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena
    Identity Based Multisignatures. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2006, v:17, n:2, pp:177-186 [Journal]
  29. Phani Kumar Kancharla, Shailaja Gummadidala, Ashutosh Saxena
    Identity Based Strong Designated Verifier Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2007, v:18, n:2, pp:239-252 [Journal]

  30. A Fast Data Collection and Augmentation Procedure for Object Recognition. [Citation Graph (, )][DBLP]


  31. Make3D: Depth Perception from a Single Still Image. [Citation Graph (, )][DBLP]


  32. Learning Grasp Strategies with Partial Shape Information. [Citation Graph (, )][DBLP]


  33. Dynamic authentication: Need than a choice. [Citation Graph (, )][DBLP]


  34. An Efficient Authentication Protocol for GSM. [Citation Graph (, )][DBLP]


  35. Synthetic Data for Privacy Preserving Data Mining. [Citation Graph (, )][DBLP]


  36. HEMIN: A Cryptographic Approach for Private k-NN Classification. [Citation Graph (, )][DBLP]


  37. Learning 3-D Scene Structure from a Single Still Image. [Citation Graph (, )][DBLP]


  38. 3-D Reconstruction from Sparse Views using Monocular Vision. [Citation Graph (, )][DBLP]


  39. Learning 3-D object orientation from images. [Citation Graph (, )][DBLP]


  40. Learning sound location from a single microphone. [Citation Graph (, )][DBLP]


  41. Reactive grasping using optical proximity sensors. [Citation Graph (, )][DBLP]


  42. A model to secure data warehouse. [Citation Graph (, )][DBLP]


  43. Learning to Grasp Novel Objects Using Vision. [Citation Graph (, )][DBLP]


  44. Cascaded Classification Models: Combining Models for Holistic Scene Understanding. [Citation Graph (, )][DBLP]


  45. i23 - Rapid Interactive 3D Reconstruction from a Single Image. [Citation Graph (, )][DBLP]


  46. A Robust Wavelet Based Digital Watermarking Scheme Using Chaotic Mixing. [Citation Graph (, )][DBLP]


  47. Threshold SKI Protocol for ID-based Cryptosystems. [Citation Graph (, )][DBLP]


  48. A cryptography based privacy preserving solution to mine cloud data. [Citation Graph (, )][DBLP]


  49. Autonomous indoor helicopter flight using a single onboard camera. [Citation Graph (, )][DBLP]


  50. An efficient and secure protocol for DTV broadcasts. [Citation Graph (, )][DBLP]


  51. Danger theory based SYN flood attack detection in autonomic network. [Citation Graph (, )][DBLP]


  52. Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing [Citation Graph (, )][DBLP]


  53. Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems [Citation Graph (, )][DBLP]


  54. A Dynamic ID-based Remote User Authentication Scheme [Citation Graph (, )][DBLP]


  55. Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [Citation Graph (, )][DBLP]


  56. MDPs with Unawareness [Citation Graph (, )][DBLP]


Search in 0.021secs, Finished in 0.023secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002