dblp.uni-trier.dewww.uni-trier.de

Kapali Viswanathan

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
18EEPraveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan: Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. ACISP 2006: 407-420
2004
17 Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan: Denial of Service Issues in Voice Over IP Networks. ICETE (2) 2004: 230-237
2003
16EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Five Sealed-bid Auction Models. ACSW Frontiers 2003: 77-86
15EERiza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan: Secure e-Voting for Preferential Elections. EGOV 2003: 246-249
2002
14EEColin Boyd, Kapali Viswanathan: Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. FASec 2002: 49-61
13EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. ICICS 2002: 147-159
12EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Non-interactive Auction Schemewith Strong Privacy. ICISC 2002: 407-420
11EEKapali Viswanathan, Ashutosh Saxena: Towards Logically and Physically Secure Public-Key Infrastructures. INDOCRYPT 2002: 122-134
10 Kapali Viswanathan, Colin Boyd, Ed Dawson: Hybrid Key Escrow: A New Paradigm. Computers & Security 21(1): 77-92 (2002)
9EEJuan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson: Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002)
8EEEd Dawson, Kapali Viswanathan, Colin Boyd: Compliant cryptologic protocols. Int. J. Inf. Sec. 1(3): 189-202 (2002)
2001
7EEKapali Viswanathan, Colin Boyd, Ed Dawson: An Analysis of Integrity Services in Protocols. INDOCRYPT 2001: 175-187
2000
6 Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson: Key Recovery System for the Commercial Environment. ACISP 2000: 149-162
5 Kapali Viswanathan, Colin Boyd, Ed Dawson: A Three Phased Schema for Sealed Bid Auction System Design. ACISP 2000: 412-426
1999
4EEKapali Viswanathan, Colin Boyd, Ed Dawson: Publicly Verifiable Key Escrow with Limited Time Span. ACISP 1999: 36-50
3 Kapali Viswanathan, Colin Boyd, Ed Dawson: Signature Scheme for Controlled Environments. ICICS 1999: 119-134
2 Kapali Viswanathan, Colin Boyd, Ed Dawson: Secure Selection Protocols. ICISC 1999: 132-146
1EEKapali Viswanathan, Colin Boyd, Ed Dawson: Strong Binding for Software Key Escrow. ICPP Workshops 1999: 134-139

Coauthor Index

1Riza Aditya [15]
2Colin Boyd [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [12] [13] [14] [15] [16]
3Andrew Clark [9] [17]
4Ed Dawson [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [12] [13] [15] [16] [18]
5Praveen Gauravaram [18]
6William Millan [18]
7Juan Manuel González Nieto (Juanma González Nieto) [6] [9] [17]
8Kun Peng [12] [13] [16]
9Jason Reid [17]
10Ashutosh Saxena [11]
11Jason Smith [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)