default search action
Ved Prakash Gulati
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2007
- [j9]Challa S. Sastry, Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati:
Network traffic analysis using singular value decomposition and multiscale transforms. Inf. Sci. 177(23): 5275-5291 (2007) - [c23]A. R. Dani, Arun K. Pujari, Ved Prakash Gulati:
Strategy proof electronic markets. ICEC 2007: 45-54 - [c22]A. R. Dani, Arun K. Pujari, Ved Prakash Gulati:
Strategy Proof Electronic Markets. IICAI 2007: 2155-2171 - [i3]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
A Dynamic ID-based Remote User Authentication Scheme. CoRR abs/0712.2235 (2007) - 2006
- [j8]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:
A novel remote user authentication scheme using bilinear pairings. Comput. Secur. 25(3): 184-189 (2006) - [c21]A. R. Dani, Arun K. Pujari, Ved Prakash Gulati:
Multi Unit Auctions with Constraints in Financial Domain. CEC/EEE 2006: 17 - 2005
- [j7]V. Radha, Ved Prakash Gulati, Arun K. Pujari:
Appcast: a low stress and high stretch overlay protocol. Int. J. Grid Util. Comput. 1(1): 38-45 (2005) - [j6]Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari:
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. J. Univers. Comput. Sci. 11(1): 122-149 (2005) - [j5]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:
Hierarchical key management scheme using polynomial interpolation. ACM SIGOPS Oper. Syst. Rev. 39(1): 40-47 (2005) - [j4]Sanjay Rawat, Ved Prakash Gulati, Arun K. Pujari:
A Fast Host-Based Intrusion Detection System Using Rough Set Theory. Trans. Rough Sets 4: 144-161 (2005) - [c20]N. Rajendran, K. Yugandhar, S. Albert Rabara, Ved Prakash Gulati:
Modeling and Performance study of MPLS VPN. Communications in Computing 2005: 91-98 - [c19]A. R. Dani, Arun K. Pujari, Ved Prakash Gulati:
Continuous Call Double Auctions with Indivisibility Constraints. EEE 2005: 32-37 - [c18]A. R. Dani, Ved Prakash Gulati, Arun K. Pujari:
Auction Based System for Electronic Commerce Transaction. ICEIS (4) 2005: 16-23 - [c17]V. Radha, Ved Prakash Gulati, N. Hemanth Kumar:
Securing the Enterprise Database. ICEIS (1) 2005: 76-83 - [c16]A. R. Dani, Ved Prakash Gulati, Arun K. Pujari:
Design of Continuous Call Market with Assignment Constraints. ICEIS (4) 2005: 182-187 - [c15]Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati:
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach. ISPEC 2005: 25-35 - [c14]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. ITCC (1) 2005: 674-678 - [c13]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
Cryptanalysis and Improvement of a Multisignature Scheme. IWDC 2005: 398-403 - [c12]Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
ID-based Serial Multisignature Scheme using Bilinear Pairings. WOSIS 2005: 40-47 - [i2]Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari:
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. CoRR abs/cs/0505062 (2005) - 2004
- [j3]Sanjay Rawat, Ved Prakash Gulati, Arun K. Pujari:
Frequency- and ordering-based similarity measure for host-based intrusion detection. Inf. Manag. Comput. Secur. 12(5): 411-421 (2004) - [j2]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
An Efficient Proxy Signature Scheme with Revocation. Informatica 15(4): 455-464 (2004) - [j1]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
A dynamic ID-based remote user authentication scheme. IEEE Trans. Consumer Electron. 50(2): 629-631 (2004) - [c11]V. Radha, Ved Prakash Gulati, Arun K. Pujari:
A Balanced Multicast Overlay Protocol - Appcast. AINA (2) 2004: 307-312 - [c10]A. R. Dani, Ved Prakash Gulati:
A framework for modeling automated negotiation. IASTED Conf. on Software Engineering and Applications 2004: 418-423 - [c9]N. Rajendran, K. Yugandhar, Ved Prakash Gulati, S. Albert Rabara:
MPLS Architecture for Service Provider. ICETE (2) 2004: 183-190 - [c8]V. Radha, Ved Prakash Gulati, Rajesh Thapar:
Evolution of Web Services Approach in SFMS - A Case Study. ICWS 2004: 640-647 - [c7]Debabrata Nayak, Deepak B. Phatak, Ved Prakash Gulati, N. Rajendran:
Modeling and Performance Evaluation of Security Architecture for Wireless Local Area Networks. International Conference on Computational Intelligence 2004: 369-374 - [c6]V. Radha, Ved Prakash Gulati, Arun K. Pujari:
Efficient Multicast E-Services Over APPCAST. ITCC (2) 2004: 331-336 - [c5]Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari:
On Gossip Codes and Traceability Schemes. ITCC (1) 2004: 772-777 - [c4]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
A Novel Remote User Authentication Scheme Through Dynamic Login Identity. IWDC 2004: 532 - [c3]Sanjay Rawat, Arun K. Pujari, Ved Prakash Gulati:
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. VODCA@FOSAD 2004: 215-228 - [e1]Gautam Das, Ved Prakash Gulati:
Intelligent Information Technology, 7th International Conference on Information Technology, CIT 2004, Hyderabad, India, December 20-23, 2004, Proceedings. Lecture Notes in Computer Science 3356, Springer 2004, ISBN 3-540-24126-4 [contents] - 2003
- [c2]V. Radha, Ved Prakash Gulati, Arun K. Pujari:
Appcast - A Low Stress and High Stretch Overlay Protocol. GCC (2) 2003: 360-371 - [i1]Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati:
Security Analysis of Lal and Awasthi's Proxy Signature Schemes. IACR Cryptol. ePrint Arch. 2003: 263 (2003) - 2002
- [c1]Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati:
Reed Solomon Codes for Digital Fingerprinting. INDOCRYPT 2002: 163-175
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint