Ganapathy S. Sundaram

According to our database1, Ganapathy S. Sundaram authored at least 15 papers between 1998 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
IBAKE: Identity-Based Authenticated Key Exchange.
RFC, March, 2012

Secure Enablement of Real Time Applications: A Novel End-to-End Approach.
Bell Labs Tech. J., 2012

Group Authentication: A New Paradigm for Emerging Applications.
Bell Labs Tech. J., 2012

Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks.
Bell Labs Tech. J., 2012

2011
MIKEY-IBAKE: Identity-Based Authenticated Key Exchange (IBAKE) Mode of Key Distribution in Multimedia Internet KEYing (MIKEY).
RFC, June, 2011

IBAKE: Identity-Based Authenticated Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2011

2004
Efficient Constructions of Variable-Input-Length Block Ciphers.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

2003
Evolution of the reverse link of CDMA-based systems to support high-speed data.
Bell Labs Tech. J., 2003

On securely enabling intermediary-based services and performance enhancements for wireless mobile users.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

2002
Wireless network security architecture.
Bell Labs Tech. J., 2002

Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive.
Proceedings of the Selected Areas in Cryptography, 2002

2001
Security for wireless internet access.
Bell Labs Tech. J., 2001

2000
Downlink scheduling in CDMA data networks.
Proceedings of the MOBICOM 2000, 2000

1999
Towards Making Luby-Rackoff Ciphers Optimal and Practical.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

1998
An Efficient Discrete Log Pseudo Random Generator.
Proceedings of the Advances in Cryptology, 1998


  Loading...