2006 |
18 | EE | Praveen Gauravaram,
William Millan,
Ed Dawson,
Kapali Viswanathan:
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction.
ACISP 2006: 407-420 |
2004 |
17 | | Jason Reid,
Andrew Clark,
Juan Manuel González Nieto,
Jason Smith,
Kapali Viswanathan:
Denial of Service Issues in Voice Over IP Networks.
ICETE (2) 2004: 230-237 |
2003 |
16 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Five Sealed-bid Auction Models.
ACSW Frontiers 2003: 77-86 |
15 | EE | Riza Aditya,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Secure e-Voting for Preferential Elections.
EGOV 2003: 246-249 |
2002 |
14 | EE | Colin Boyd,
Kapali Viswanathan:
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis.
FASec 2002: 49-61 |
13 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.
ICICS 2002: 147-159 |
12 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Non-interactive Auction Schemewith Strong Privacy.
ICISC 2002: 407-420 |
11 | EE | Kapali Viswanathan,
Ashutosh Saxena:
Towards Logically and Physically Secure Public-Key Infrastructures.
INDOCRYPT 2002: 122-134 |
10 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Hybrid Key Escrow: A New Paradigm.
Computers & Security 21(1): 77-92 (2002) |
9 | EE | Juan Manuel González Nieto,
Kapali Viswanathan,
Colin Boyd,
Andrew Clark,
Ed Dawson:
Key recovery for the commercial environment.
Int. J. Inf. Sec. 1(3): 161-174 (2002) |
8 | EE | Ed Dawson,
Kapali Viswanathan,
Colin Boyd:
Compliant cryptologic protocols.
Int. J. Inf. Sec. 1(3): 189-202 (2002) |
2001 |
7 | EE | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
An Analysis of Integrity Services in Protocols.
INDOCRYPT 2001: 175-187 |
2000 |
6 | | Juanma González Nieto,
Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Key Recovery System for the Commercial Environment.
ACISP 2000: 149-162 |
5 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
A Three Phased Schema for Sealed Bid Auction System Design.
ACISP 2000: 412-426 |
1999 |
4 | EE | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Publicly Verifiable Key Escrow with Limited Time Span.
ACISP 1999: 36-50 |
3 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Signature Scheme for Controlled Environments.
ICICS 1999: 119-134 |
2 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Secure Selection Protocols.
ICISC 1999: 132-146 |
1 | EE | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Strong Binding for Software Key Escrow.
ICPP Workshops 1999: 134-139 |