dblp.uni-trier.dewww.uni-trier.de

Ved Prakash Gulati

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
32EEA. R. Dani, Arun K. Pujari, Ved Prakash Gulati: Strategy proof electronic markets. ICEC 2007: 45-54
31 A. R. Dani, Arun K. Pujari, Ved Prakash Gulati: Strategy Proof Electronic Markets. IICAI 2007: 2155-2171
30EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: A Dynamic ID-based Remote User Authentication Scheme CoRR abs/0712.2235: (2007)
29EEChalla S. Sastry, Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati: Network traffic analysis using singular value decomposition and multiscale transforms. Inf. Sci. 177(23): 5275-5291 (2007)
2006
28EEA. R. Dani, Arun K. Pujari, Ved Prakash Gulati: Multi Unit Auctions with Constraints in Financial Domain. CEC/EEE 2006: 17
27EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak: A novel remote user authentication scheme using bilinear pairings. Computers & Security 25(3): 184-189 (2006)
26EESanjay Rawat, Arun K. Pujari, Ved Prakash Gulati: On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. Electr. Notes Theor. Comput. Sci. 142: 215-228 (2006)
2005
25 N. Rajendran, K. Yugandhar, S. Albert Rabara, Ved Prakash Gulati: Modeling and Performance study of MPLS VPN. Communications in Computing 2005: 91-98
24EEA. R. Dani, Arun K. Pujari, Ved Prakash Gulati: Continuous Call Double Auctions with Indivisibility Constraints. EEE 2005: 32-37
23 V. Radha, Ved Prakash Gulati, N. Hemanth Kumar: Securing the Enterprise Database. ICEIS (1) 2005: 76-83
22 A. R. Dani, Ved Prakash Gulati, Arun K. Pujari: Auction Based System for Electronic Commerce Transaction. ICEIS (4) 2005: 16-23
21 A. R. Dani, Ved Prakash Gulati, Arun K. Pujari: Design of Continuous Call Market with Assignment Constraints. ICEIS (4) 2005: 182-187
20EEDebabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati: Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. ISPEC 2005: 25-35
19EERaju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. ITCC (1) 2005: 674-678
18EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: Cryptanalysis and Improvement of a Multisignature Scheme. IWDC 2005: 398-403
17 Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: ID-based Serial Multisignature Scheme using Bilinear Pairings. WOSIS 2005: 40-47
16EERavi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari: Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing CoRR abs/cs/0505062: (2005)
15EERavi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari: Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. J. UCS 11(1): 122-149 (2005)
14EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak: Hierarchical key management scheme using polynomial interpolation. Operating Systems Review 39(1): 40-47 (2005)
13EESanjay Rawat, Ved Prakash Gulati, Arun K. Pujari: A Fast Host-Based Intrusion Detection System Using Rough Set Theory. T. Rough Sets: 144-161 (2005)
2004
12 Gautam Das, Ved Prakash Gulati: Intelligent Information Technology, 7th International Conference on Information Technology, CIT 2004, Hyderabad, India, December 20-23, 2004, Proceedings Springer 2004
11EEV. Radha, Ved Prakash Gulati, Arun K. Pujari: A Balanced Multicast Overlay Protocol - Appcast. AINA (2) 2004: 307-312
10 A. R. Dani, Ved Prakash Gulati: A framework for modeling automated negotiation. IASTED Conf. on Software Engineering and Applications 2004: 418-423
9 N. Rajendran, K. Yugandhar, Ved Prakash Gulati, S. Albert Rabara: MPLS Architecture for Service Provider. ICETE (2) 2004: 183-190
8EEV. Radha, Ved Prakash Gulati, Rajesh Thapar: Evolution of Web Services Approach in SFMS - A Case Study. ICWS 2004: 640-647
7EERavi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari: On Gossip Codes and Traceability Schemes. ITCC (1) 2004: 772-777
6EEV. Radha, Ved Prakash Gulati, Arun K. Pujari: Efficient Multicast E-Services Over APPCAST. ITCC (2) 2004: 331-336
5EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: A Novel Remote User Authentication Scheme Through Dynamic Login Identity. IWDC 2004: 532
4 Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati, N. Rajendran: Modeling and Performance Evaluation of Security Architecture for Wireless Local Area Networks. International Conference on Computational Intelligence 2004: 369-374
3EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: An Efficient Proxy Signature Scheme with Revocation. Informatica, Lith. Acad. Sci. 15(4): 455-464 (2004)
2003
2EEV. Radha, Ved Prakash Gulati, Arun K. Pujari: Appcast - A Low Stress and High Stretch Overlay Protocol. GCC (2) 2003: 360-371
2002
1EERavi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati: Reed Solomon Codes for Digital Fingerprinting. INDOCRYPT 2002: 163-175

Coauthor Index

1A. R. Dani [10] [21] [22] [24] [28] [31] [32]
2Gautam Das [12]
3Manik Lal Das [3] [5] [14] [17] [18] [19] [27] [30]
4Raju Gangishetti [17] [19]
5M. Choudary Gorantla [17] [19]
6N. Hemanth Kumar [23]
7Debabrata Nayak [4] [20]
8Deepak B. Phatak [4] [14] [20] [27]
9Arun K. Pujari [2] [6] [7] [11] [13] [15] [16] [21] [22] [24] [26] [28] [29] [31] [32]
10S. Albert Rabara [9] [25]
11V. Radha [2] [6] [8] [11] [23]
12N. Rajendran [4] [9] [25]
13Sanjay Rawat [13] [26] [29]
14Challa S. Sastry [29]
15Ashutosh Saxena [1] [3] [5] [7] [14] [15] [16] [17] [18] [19] [27] [30]
16Rajesh Thapar [8]
17Ravi Sankar Veerubhotla [1] [7] [15] [16]
18K. Yugandhar [9] [25]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)