2009 | ||
---|---|---|
8 | EE | Amit K. Awasthi, Sanjay Chaudhary: Non Homogeneous Poisson Process Model based Optimal Modular Software Testing using Fault Tolerance CoRR abs/0904.2769: (2009) |
2008 | ||
7 | EE | Amit K. Awasthi: On the Security of Liaw et al.'s Scheme CoRR abs/0806.0860: (2008) |
2005 | ||
6 | EE | Amit K. Awasthi, Sunder Lal: A Multi-proxy Signature Scheme for Partial delegation with Warrant CoRR abs/cs/0504093: (2005) |
5 | EE | Amit K. Awasthi: A New Remote User Authentication Scheme Using Smart Cards with Check Digits CoRR abs/cs/0504094: (2005) |
4 | EE | Amit K. Awasthi, Sunder Lal: An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption CoRR abs/cs/0504095: (2005) |
3 | EE | Amit K. Awasthi, Sunder Lal: ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings CoRR abs/cs/0504097: (2005) |
2004 | ||
2 | EE | Amit K. Awasthi, Sunder Lal: A New Proxy Ring Signature Scheme CoRR cs.CR/0410010: (2004) |
1 | EE | Amit K. Awasthi: Comment on A dynamic ID-based Remote User Authentication Scheme CoRR cs.CR/0410011: (2004) |
1 | Sanjay Chaudhary | [8] |
2 | Sunder Lal | [2] [3] [4] [6] |