Search the dblp DataBase
Ashutosh Saxena :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
M. Choudary Gorantla , Ashutosh Saxena An Efficient Certificateless Signature Scheme. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:110-116 [Conf ] Sadybakasov Ulanbek , Ashutosh Saxena , Atul Negi On Reduction of Bootstrapping Information Using Digital Multisignature. [Citation Graph (0, 0)][DBLP ] CIT, 2004, pp:198-204 [Conf ] G. Shailaja , K. Phani Kumar , Ashutosh Saxena Universal Designated Multi Verifier Signature without Random Oracles. [Citation Graph (0, 0)][DBLP ] ICIT, 2006, pp:168-171 [Conf ] M. Choudary Gorantla , Ashutosh Saxena Verifiably Encrypted Signature Scheme Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2005, pp:357-363 [Conf ] Manik Lal Das , Ashutosh Saxena SPAM: Secure Protocol for Authentication in Mobile-Communications. [Citation Graph (0, 0)][DBLP ] ICMB, 2005, pp:23-27 [Conf ] Ashutosh Saxena , Manik Lal Das , Anurag Gupta MMPS: A Versatile Mobile-to-Mobile Payment System. [Citation Graph (0, 0)][DBLP ] ICMB, 2005, pp:400-405 [Conf ] K. Phani Kumar , G. Shailaja , A. Kavitha , Ashutosh Saxena Mutual Authentication and Key Agreement for GSM. [Citation Graph (0, 0)][DBLP ] ICMB, 2006, pp:25- [Conf ] Jeff Michels , Ashutosh Saxena , Andrew Y. Ng High speed obstacle avoidance using monocular vision and reinforcement learning. [Citation Graph (0, 0)][DBLP ] ICML, 2005, pp:593-600 [Conf ] Ashutosh Saxena , Abhinav Gupta , Amitabha Mukerjee Non-linear Dimensionality Reduction by Locally Linear Isomaps. [Citation Graph (0, 0)][DBLP ] ICONIP, 2004, pp:1038-1043 [Conf ] Ashutosh Saxena , Jamie Schulte , Andrew Y. Ng Depth Estimation Using Monocular and Stereo Cues. [Citation Graph (0, 0)][DBLP ] IJCAI, 2007, pp:2197-2203 [Conf ] Ravi Sankar Veerubhotla , Ashutosh Saxena , Ved Prakash Gulati Reed Solomon Codes for Digital Fingerprinting. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:163-175 [Conf ] Kapali Viswanathan , Ashutosh Saxena Towards Logically and Physically Secure Public-Key Infrastructures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:122-134 [Conf ] Raju Gangishetti , M. Choudary Gorantla , Manik Lal Das , Ashutosh Saxena , Ved Prakash Gulati An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:674-678 [Conf ] Ravi Sankar Veerubhotla , Ashutosh Saxena , Ved Prakash Gulati , Arun K. Pujari On Gossip Codes and Traceability Schemes. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:772-777 [Conf ] Manik Lal Das , Ashutosh Saxena , Ved Prakash Gulati A Novel Remote User Authentication Scheme Through Dynamic Login Identity. [Citation Graph (0, 0)][DBLP ] IWDC, 2004, pp:532- [Conf ] Manik Lal Das , Ashutosh Saxena , Ved Prakash Gulati Cryptanalysis and Improvement of a Multisignature Scheme. [Citation Graph (0, 0)][DBLP ] IWDC, 2005, pp:398-403 [Conf ] Ashutosh Saxena , Gaurav Gupta , Vadim Gerasimov , Sébastien Ourselin In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States. [Citation Graph (0, 0)][DBLP ] KES (4), 2005, pp:595-601 [Conf ] Ashutosh Saxena , Sung H. Chung , Andrew Y. Ng Learning Depth from Single Monocular Images. [Citation Graph (0, 0)][DBLP ] NIPS, 2005, pp:- [Conf ] Raju Gangishetti , M. Choudary Gorantla , Manik Lal Das , Ashutosh Saxena , Ved Prakash Gulati ID-based Serial Multisignature Scheme using Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:40-47 [Conf ] M. Choudary Gorantla , Raju Gangishetti , Manik Lal Das , Ashutosh Saxena An Effective Certificateless Signature Scheme Based on Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:31-39 [Conf ] Manik Lal Das , Ashutosh Saxena , Ved Prakash Gulati , Deepak B. Phatak A novel remote user authentication scheme using bilinear pairings. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:3, pp:184-189 [Journal ] Ashutosh Saxena , Suju M. George , P. Rambabu Interconnection Wire-Length Estimation in VLSI Standard Cell Placement Via Neural Network. [Citation Graph (0, 0)][DBLP ] International Journal on Artificial Intelligence Tools, 1998, v:7, n:4, pp:443-451 [Journal ] Manik Lal Das , Ashutosh Saxena , Ved Prakash Gulati An Efficient Proxy Signature Scheme with Revocation. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2004, v:15, n:4, pp:455-464 [Journal ] Ravi Sankar Veerubhotla , Ashutosh Saxena , Ved Prakash Gulati , Arun K. Pujari Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:122-149 [Journal ] Manik Lal Das , Ashutosh Saxena , Ved Prakash Gulati , Deepak B. Phatak Hierarchical key management scheme using polynomial interpolation. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2005, v:39, n:1, pp:40-47 [Journal ] Ashutosh Saxena , Justin Driemeyer , Justin Kearns , Andrew Y. Ng Robotic Grasping of Novel Objects. [Citation Graph (0, 0)][DBLP ] NIPS, 2006, pp:1209-1216 [Conf ] Manik Lal Das , Ashutosh Saxena , Deepak B. Phatak Algorithms and Approaches of Proxy Signature: A Survey [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Raju Gangishetti , M. Choudary Gorantla , Manik Lal Das , Ashutosh Saxena Identity Based Multisignatures. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2006, v:17, n:2, pp:177-186 [Journal ] Phani Kumar Kancharla , Shailaja Gummadidala , Ashutosh Saxena Identity Based Strong Designated Verifier Signature Scheme. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2007, v:18, n:2, pp:239-252 [Journal ] A Fast Data Collection and Augmentation Procedure for Object Recognition. [Citation Graph (, )][DBLP ] Make3D: Depth Perception from a Single Still Image. [Citation Graph (, )][DBLP ] Learning Grasp Strategies with Partial Shape Information. [Citation Graph (, )][DBLP ] Dynamic authentication: Need than a choice. [Citation Graph (, )][DBLP ] An Efficient Authentication Protocol for GSM. [Citation Graph (, )][DBLP ] Synthetic Data for Privacy Preserving Data Mining. [Citation Graph (, )][DBLP ] HEMIN: A Cryptographic Approach for Private k-NN Classification. [Citation Graph (, )][DBLP ] Learning 3-D Scene Structure from a Single Still Image. [Citation Graph (, )][DBLP ] 3-D Reconstruction from Sparse Views using Monocular Vision. [Citation Graph (, )][DBLP ] Learning 3-D object orientation from images. [Citation Graph (, )][DBLP ] Learning sound location from a single microphone. [Citation Graph (, )][DBLP ] Reactive grasping using optical proximity sensors. [Citation Graph (, )][DBLP ] A model to secure data warehouse. [Citation Graph (, )][DBLP ] Learning to Grasp Novel Objects Using Vision. [Citation Graph (, )][DBLP ] Cascaded Classification Models: Combining Models for Holistic Scene Understanding. [Citation Graph (, )][DBLP ] i23 - Rapid Interactive 3D Reconstruction from a Single Image. [Citation Graph (, )][DBLP ] A Robust Wavelet Based Digital Watermarking Scheme Using Chaotic Mixing. [Citation Graph (, )][DBLP ] Threshold SKI Protocol for ID-based Cryptosystems. [Citation Graph (, )][DBLP ] A cryptography based privacy preserving solution to mine cloud data. [Citation Graph (, )][DBLP ] Autonomous indoor helicopter flight using a single onboard camera. [Citation Graph (, )][DBLP ] An efficient and secure protocol for DTV broadcasts. [Citation Graph (, )][DBLP ] Danger theory based SYN flood attack detection in autonomic network. [Citation Graph (, )][DBLP ] Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing [Citation Graph (, )][DBLP ] Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems [Citation Graph (, )][DBLP ] A Dynamic ID-based Remote User Authentication Scheme [Citation Graph (, )][DBLP ] Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [Citation Graph (, )][DBLP ] MDPs with Unawareness [Citation Graph (, )][DBLP ] Search in 0.030secs, Finished in 0.033secs