2007 |
32 | EE | A. R. Dani,
Arun K. Pujari,
Ved Prakash Gulati:
Strategy proof electronic markets.
ICEC 2007: 45-54 |
31 | | A. R. Dani,
Arun K. Pujari,
Ved Prakash Gulati:
Strategy Proof Electronic Markets.
IICAI 2007: 2155-2171 |
30 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
A Dynamic ID-based Remote User Authentication Scheme
CoRR abs/0712.2235: (2007) |
29 | EE | Challa S. Sastry,
Sanjay Rawat,
Arun K. Pujari,
Ved Prakash Gulati:
Network traffic analysis using singular value decomposition and multiscale transforms.
Inf. Sci. 177(23): 5275-5291 (2007) |
2006 |
28 | EE | A. R. Dani,
Arun K. Pujari,
Ved Prakash Gulati:
Multi Unit Auctions with Constraints in Financial Domain.
CEC/EEE 2006: 17 |
27 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati,
Deepak B. Phatak:
A novel remote user authentication scheme using bilinear pairings.
Computers & Security 25(3): 184-189 (2006) |
26 | EE | Sanjay Rawat,
Arun K. Pujari,
Ved Prakash Gulati:
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System.
Electr. Notes Theor. Comput. Sci. 142: 215-228 (2006) |
2005 |
25 | | N. Rajendran,
K. Yugandhar,
S. Albert Rabara,
Ved Prakash Gulati:
Modeling and Performance study of MPLS VPN.
Communications in Computing 2005: 91-98 |
24 | EE | A. R. Dani,
Arun K. Pujari,
Ved Prakash Gulati:
Continuous Call Double Auctions with Indivisibility Constraints.
EEE 2005: 32-37 |
23 | | V. Radha,
Ved Prakash Gulati,
N. Hemanth Kumar:
Securing the Enterprise Database.
ICEIS (1) 2005: 76-83 |
22 | | A. R. Dani,
Ved Prakash Gulati,
Arun K. Pujari:
Auction Based System for Electronic Commerce Transaction.
ICEIS (4) 2005: 16-23 |
21 | | A. R. Dani,
Ved Prakash Gulati,
Arun K. Pujari:
Design of Continuous Call Market with Assignment Constraints.
ICEIS (4) 2005: 182-187 |
20 | EE | Debabrata Nayak,
Deepak B. Phatak,
Ved Prakash Gulati:
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach.
ISPEC 2005: 25-35 |
19 | EE | Raju Gangishetti,
M. Choudary Gorantla,
Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems.
ITCC (1) 2005: 674-678 |
18 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
Cryptanalysis and Improvement of a Multisignature Scheme.
IWDC 2005: 398-403 |
17 | | Raju Gangishetti,
M. Choudary Gorantla,
Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
ID-based Serial Multisignature Scheme using Bilinear Pairings.
WOSIS 2005: 40-47 |
16 | EE | Ravi Sankar Veerubhotla,
Ashutosh Saxena,
Ved Prakash Gulati,
Arun K. Pujari:
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing
CoRR abs/cs/0505062: (2005) |
15 | EE | Ravi Sankar Veerubhotla,
Ashutosh Saxena,
Ved Prakash Gulati,
Arun K. Pujari:
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing.
J. UCS 11(1): 122-149 (2005) |
14 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati,
Deepak B. Phatak:
Hierarchical key management scheme using polynomial interpolation.
Operating Systems Review 39(1): 40-47 (2005) |
13 | EE | Sanjay Rawat,
Ved Prakash Gulati,
Arun K. Pujari:
A Fast Host-Based Intrusion Detection System Using Rough Set Theory.
T. Rough Sets: 144-161 (2005) |
2004 |
12 | | Gautam Das,
Ved Prakash Gulati:
Intelligent Information Technology, 7th International Conference on Information Technology, CIT 2004, Hyderabad, India, December 20-23, 2004, Proceedings
Springer 2004 |
11 | EE | V. Radha,
Ved Prakash Gulati,
Arun K. Pujari:
A Balanced Multicast Overlay Protocol - Appcast.
AINA (2) 2004: 307-312 |
10 | | A. R. Dani,
Ved Prakash Gulati:
A framework for modeling automated negotiation.
IASTED Conf. on Software Engineering and Applications 2004: 418-423 |
9 | | N. Rajendran,
K. Yugandhar,
Ved Prakash Gulati,
S. Albert Rabara:
MPLS Architecture for Service Provider.
ICETE (2) 2004: 183-190 |
8 | EE | V. Radha,
Ved Prakash Gulati,
Rajesh Thapar:
Evolution of Web Services Approach in SFMS - A Case Study.
ICWS 2004: 640-647 |
7 | EE | Ravi Sankar Veerubhotla,
Ashutosh Saxena,
Ved Prakash Gulati,
Arun K. Pujari:
On Gossip Codes and Traceability Schemes.
ITCC (1) 2004: 772-777 |
6 | EE | V. Radha,
Ved Prakash Gulati,
Arun K. Pujari:
Efficient Multicast E-Services Over APPCAST.
ITCC (2) 2004: 331-336 |
5 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
A Novel Remote User Authentication Scheme Through Dynamic Login Identity.
IWDC 2004: 532 |
4 | | Debabrata Nayak,
Deepak B. Phatak,
Ved Prakash Gulati,
N. Rajendran:
Modeling and Performance Evaluation of Security Architecture for Wireless Local Area Networks.
International Conference on Computational Intelligence 2004: 369-374 |
3 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
An Efficient Proxy Signature Scheme with Revocation.
Informatica, Lith. Acad. Sci. 15(4): 455-464 (2004) |
2003 |
2 | EE | V. Radha,
Ved Prakash Gulati,
Arun K. Pujari:
Appcast - A Low Stress and High Stretch Overlay Protocol.
GCC (2) 2003: 360-371 |
2002 |
1 | EE | Ravi Sankar Veerubhotla,
Ashutosh Saxena,
Ved Prakash Gulati:
Reed Solomon Codes for Digital Fingerprinting.
INDOCRYPT 2002: 163-175 |