Kapali Viswanathan
Kapali Viswanathan
Siemens Technology
Adresă de e-mail confirmată pe siemens.com - Pagina de pornire
Citat de
Citat de
Robust, privacy protecting and publicly verifiable sealed-bid auction
K Peng, C Boyd, E Dawson, K Viswanathan
Information and Communications Security: 4th International Conference, ICICS …, 2002
A three phased schema for sealed bid auction system design
K Viswanathan, C Boyd, E Dawson
Information Security and Privacy: 5th Australasian Conference, ACISP 2000 …, 2000
Constructing secure hash functions by enhancing Merkle-Damgård construction
P Gauravaram, W Millan, E Dawson, K Viswanathan
Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006
A correct, private, and efficient mix network
K Peng, C Boyd, E Dawson, K Viswanathan
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
Five sealed-bid auction models
K Peng, C Boyd, E Dawson, K Viswanathan
Proceedings of the Australasian information security workshop conference on …, 2003
NLHB: A non-linear Hopper-Blum protocol
M Madhavan, A Thangaraj, Y Sankarasubramanian, K Viswanathan
2010 IEEE International Symposium on Information Theory, 2498-2502, 2010
Secure e-voting for preferential elections
R Aditya, C Boyd, E Dawson, K Viswanathan
Electronic Government: Second International Conference, EGOV 2003, Prague …, 2003
Non-interactive auction scheme with strong privacy
K Peng, C Boyd, E Dawson, K Viswanathan
Information Security and Cryptology—ICISC 2002: 5th International …, 2003
Finite-state wiretap channels: Secrecy under memory constraints
Y Sankarasubramaniam, A Thangaraj, K Viswanathan
2009 IEEE Information Theory Workshop, 115-119, 2009
Methods and systems for shared file storage
K Viswanathan, AK Gopalakrishnannair
US Patent App. 14/764,229, 2016
Secure document workflow
K Viswanathan, ASR Kuchibhotla, NA Matad
US Patent 8,477,379, 2013
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings
A Canteaut, K Viswanathan
Springer, 2005
Fault-tolerant secret key generation
H Tyagi, N Kashyap, Y Sankarasubramaniam, K Viswanathan
2012 IEEE International Symposium on Information Theory Proceedings, 1787-1791, 2012
NLHB: A light-weight, provably-secure variant of the HB protocol using simple non-linear functions
M Madhavan, A Thangaraj, K Viswanathan, Y Sankarasubramaniam
2010 national conference on communications (NCC), 1-5, 2010
Publicly verifiable key escrow with limited time span
K Viswanathan, C Boyd, E Dawson
Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999
Secured data transmission using identity-based cryptography
FL Templin, K Viswanathan
US Patent 10,050,946, 2018
Real-time communication security for automation networks
K Viswanathan, W Wiese, A Gopalan
US Patent 9,300,467, 2016
Key recovery system for the commercial environment
JG Nieto, K Viswanathan, C Boyd, E Dawson
ACISP, 149-162, 2000
Architecture for a Delay-and-Disruption Tolerant Public-Key Distribution Network (PKDN)
K Viswanathan, F Templin
https://tools.ietf.org/html/draft-viswanathan-dtnwg-pkdn-00, 2016
Printing system and method
S Godavari, K Viswanathan, ASR Kuchibhotla
US Patent 8,749,821, 2014
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20