2007 |
7 | EE | Manik Lal Das,
Ashutosh Saxena,
Deepak B. Phatak:
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings
CoRR abs/0712.3084: (2007) |
2006 |
6 | EE | Manik Lal Das,
Ashutosh Saxena,
Deepak B. Phatak:
Algorithms and Approaches of Proxy Signature: A Survey
CoRR abs/cs/0612098: (2006) |
5 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati,
Deepak B. Phatak:
A novel remote user authentication scheme using bilinear pairings.
Computers & Security 25(3): 184-189 (2006) |
2005 |
4 | EE | Debabrata Nayak,
Deepak B. Phatak,
Ved Prakash Gulati:
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach.
ISPEC 2005: 25-35 |
3 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati,
Deepak B. Phatak:
Hierarchical key management scheme using polynomial interpolation.
Operating Systems Review 39(1): 40-47 (2005) |
2004 |
2 | | Sunil Sayyaparaju,
Deepak B. Phatak:
XML Agent on Smart Cards.
CARDIS 2004: 303-316 |
1 | | Debabrata Nayak,
Deepak B. Phatak,
Ved Prakash Gulati,
N. Rajendran:
Modeling and Performance Evaluation of Security Architecture for Wireless Local Area Networks.
International Conference on Computational Intelligence 2004: 369-374 |