Kapali Viswanathan

According to our database1, Kapali Viswanathan authored at least 21 papers between 1999 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2012
Fault-tolerant secret key generation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2010
NLHB: A non-linear Hopper-Blum protocol.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Detecting modifications in paper documents: a coding approach.
Proceedings of the Document Recognition and Retrieval XVII, 2010

2006
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2004
Denial of Service Issues in Voice Over IP Networks.
Proceedings of the ICETE 2004, 2004

2003
Secure e-Voting for Preferential Elections.
Proceedings of the Electronic Government, Second International Conference, 2003

Five Sealed-bid Auction Models.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

2002
Key recovery for the commercial environment.
Int. J. Inf. Sec., 2002

Compliant cryptologic protocols.
Int. J. Inf. Sec., 2002

Hybrid Key Escrow: A New Paradigm.
Comput. Secur., 2002

Towards Logically and Physically Secure Public-Key Infrastructures.
Proceedings of the Progress in Cryptology, 2002

Non-interactive Auction Schemewith Strong Privacy.
Proceedings of the Information Security and Cryptology, 2002

Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

2001
An Analysis of Integrity Services in Protocols.
Proceedings of the Progress in Cryptology, 2001

2000
A Three Phased Schema for Sealed Bid Auction System Design.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Key Recovery System for the Commercial Environment.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Strong Binding for Software Key Escrow.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Secure Selection Protocols.
Proceedings of the Information Security and Cryptology, 1999

Signature Scheme for Controlled Environments.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Publicly Verifiable Key Escrow with Limited Time Span.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999


  Loading...