Dhananjay S. Phatak

According to our database1, Dhananjay S. Phatak authored at least 40 papers between 1993 and 2018.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes.
IEEE Trans. Education, 2018

Cybersecurity: Exploring core concepts through six scenarios.
Cryptologia, 2018

2016
New distributed algorithms for fast sign detection in residue number systems (RNS).
J. Parallel Distrib. Comput., 2016

How students reason about Cybersecurity concepts.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

2014
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity.
IACR Cryptology ePrint Archive, 2014

A Preliminary FPGA Implementation and Analysis of Phatak's Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System.
IACR Cryptology ePrint Archive, 2014

2013
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense.
Journal of Computer Security, 2013

A Conjunction for Private Stream Searching.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

A Simulation of Document Detection Methods and Reducing False Positives for Private Stream Searching.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies.
Cryptologia, 2012

2011
A New Paradigm to Approximate Oblivious Data Processing (ODP) for Data Confidentiality in Cloud Computing.
Proceedings of the World Congress on Services, 2011

2010
Visualizing your key for secure phone calls and language independence.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

2006
Generalized haar DWT and transformations between decision trees and neural networks.
IEEE Trans. Neural Networks, 2006

Defect Simulation Methodology for iDDT Testing.
J. Electronic Testing, 2006

2005
Perfect Fault Tolerance of the n-k-n Network.
Neural Computation, 2005

Investigating the Fault Tolerance of Neural Networks.
Neural Computation, 2005

Spread-Identity mechanisms for DOS resilience and Security.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Fast Modular Reduction for Large Wordlengths via One Linear and One Cyclic Convolution.
Proceedings of the 17th IEEE Symposium on Computer Arithmetic (ARITH-17 2005), 2005

2004
Unified transport layer support for data striping and host mobility.
IEEE Journal on Selected Areas in Communications, 2004

2003
IP-in-IP tunneling to enable the simultaneous use of multiple IP interfaces for network level connection striping.
Computer Networks, 2003

Comparison of Branching CORDIC Implementations.
Proceedings of the 14th IEEE International Conference on Application-Specific Systems, 2003

2002
Verification caching: towards efficient and secure mobile code execution environments.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Simulation of a Common Access Point for Bluetooth, 802.11 and Wired LANs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

A Novel Mechanism for Data Streaming Across Multiple IP Links for Improving Throughput and Reliability in Mobile Environments.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

2001
Constant-Time Addition and Simultaneous Format Conversion Based on Redundant Binary Representations.
IEEE Trans. Computers, 2001

Preemptive routing in Ad Hoc networks.
Proceedings of the MOBICOM 2001, 2001

Analysis of TCP Performance on Wireless Ad Hoc Networks Utilizing Preemptive Maintenance Routing.
Proceedings of the 2001 International Conference on Parallel Processing, 2001

2000
Freeze-TCP: A True End-to-End TCP Enhancement Mechanism for Mobile Environments.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

Simultaneous Approximation with Neural Networks.
IJCNN (4), 2000

1999
Relationship between fault tolerance, generalization and the Vapnik-Chervonenkis (VC) dimension of feedforward ANNs.
Proceedings of the International Joint Conference Neural Networks, 1999

Intermediate Variable Encodings that Enable Multiplexor-Based Implementations of Two Operand Addition.
Proceedings of the 14th IEEE Symposium on Computer Arithmetic (Arith-14 '99), 1999

Area x Delay (A T) Efficient Multiplier Based on an Intermediate Hybrid Signed-Digit (HSD-1) Representation.
Proceedings of the 14th IEEE Symposium on Computer Arithmetic (Arith-14 '99), 1999

1998
Comments on Duprat and Muller's Branching CORDIC Paper.
IEEE Trans. Computers, 1998

Double Step Branching CORDIC: A New Algorithm for Fast Sine and Cosine Generation.
IEEE Trans. Computers, 1998

1995
Complete and partial fault tolerance of feedforward neural nets.
IEEE Trans. Neural Networks, 1995

1994
Connectivity and performance tradeoffs in the cascade correlation learning architecture.
IEEE Trans. Neural Networks, 1994

Hybrid Signed-Digit Number Systems: A Unified Framework for Redundant Number Representations With Bounded Carry Propagation Chains.
IEEE Trans. Computers, 1994

1993
Construction of Minimal n-2-n Encoders for Any n.
Neural Computation, 1993

Hybrid Number Representations with Bounded Carry Propagation Chains.
Proceedings of the Proceedings 1993 International Conference on Computer Design: VLSI in Computers & Processors, 1993


  Loading...