Ved Prakash Gulati

According to our database1, Ved Prakash Gulati authored at least 31 papers between 2002 and 2007.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2007
Network traffic analysis using singular value decomposition and multiscale transforms.
Inf. Sci., 2007

Strategy Proof Electronic Markets.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

2006
A novel remote user authentication scheme using bilinear pairings.
Comput. Secur., 2006

Multi Unit Auctions with Constraints in Financial Domain.
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006

2005
A Fast Host-Based Intrusion Detection System Using Rough Set Theory.
Trans. Rough Sets, 2005

Hierarchical key management scheme using polynomial interpolation.
ACM SIGOPS Oper. Syst. Rev., 2005

Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing.
J. Univers. Comput. Sci., 2005

Appcast: a low stress and high stretch overlay protocol.
Int. J. Grid Util. Comput., 2005

ID-based Serial Multisignature Scheme using Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005

Cryptanalysis and Improvement of a Multisignature Scheme.
Proceedings of the Distributed Computing, 2005

An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach.
Proceedings of the Information Security Practice and Experience, 2005

Securing the Enterprise Database.
Proceedings of the ICEIS 2005, 2005

Design of Continuous Call Market with Assignment Constraints.
Proceedings of the ICEIS 2005, 2005

Auction Based System for Electronic Commerce Transaction.
Proceedings of the ICEIS 2005, 2005

Continuous Call Double Auctions with Indivisibility Constraints.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Modeling and Performance study of MPLS VPN.
Proceedings of the 2005 International Conference on Communications in Computing, 2005

2004
A dynamic ID-based remote user authentication scheme.
IEEE Trans. Consumer Electron., 2004

An Efficient Proxy Signature Scheme with Revocation.
Informatica, 2004

Frequency- and ordering-based similarity measure for host-based intrusion detection.
Inf. Manag. Comput. Secur., 2004

On the Use of Singular Value Decomposition for a Fast Intrusion Detection System.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

A Novel Remote User Authentication Scheme Through Dynamic Login Identity.
Proceedings of the Distributed Computing, 2004

On Gossip Codes and Traceability Schemes.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Efficient Multicast E-Services Over APPCAST.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Modeling and Performance Evaluation of Security Architecture for Wireless Local Area Networks.
Proceedings of the International Conference on Computational Intelligence, 2004

Evolution of Web Services Approach in SFMS - A Case Study.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

MPLS Architecture for Service Provider.
Proceedings of the ICETE 2004, 2004

A framework for modeling automated negotiation.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

A Balanced Multicast Overlay Protocol - Appcast.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Security Analysis of Lal and Awasthi's Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2003

2002
Reed Solomon Codes for Digital Fingerprinting.
Proceedings of the Progress in Cryptology, 2002


  Loading...