Follow
Ved Prakash Gulati
Ved Prakash Gulati
Professor
Verified email at ibsindia.org
Title
Cited by
Cited by
Year
A dynamic ID-based remote user authentication scheme
ML Das, A Saxena, VP Gulati
IEEE transactions on Consumer Electronics 50 (2), 629-631, 2004
8042004
A novel remote user authentication scheme using bilinear pairings
ML Das, A Saxena, VP Gulati, DB Phatak
Computers & Security 25 (3), 184-189, 2006
1732006
Intrusion detection using text processing techniques with a binary-weighted cosine metric
S Rawat, VP Gulati, AK Pujari, VR Vemuri
Journal of Information Assurance and Security 1 (1), 43-50, 2006
692006
Hierarchical key management scheme using polynomial interpolation
ML Das, A Saxena, VP Gulati, DB Phatak
ACM SIGOPS Operating Systems Review 39 (1), 40-47, 2005
652005
On the use of singular value decomposition for a fast intrusion detection system
S Rawat, AK Pujari, VP Gulati
Electronic Notes in Theoretical Computer Science 142, 215-228, 2006
482006
An efficient secure key issuing protocol in ID-based cryptosystems
R Gangishetti, MC Gorantla, ML Das, A Saxena, VP Gulati
International Conference on Information Technology: Coding and Computing …, 2005
392005
Network traffic analysis using singular value decomposition and multiscale transforms
CS Sastry, S Rawat, AK Pujari, VP Gulati
Information Sciences 177 (23), 5275-5291, 2007
322007
An efficient proxy signature scheme with revocation
ML Das, A Saxena, VP Gulati
Informatica 15 (4), 455-464, 2004
292004
A fast host-based intrusion detection system using rough set theory
S Rawat, VP Gulati, AK Pujari
Transactions on Rough Sets IV, 144-161, 2005
282005
The empowered internet payment gateway
VP Gulati, S Srivastava
International Conference on E-Governance, 98-107, 2007
272007
Information system audit and assurance
DP Dube, VP Gulati
Tata McGraw-Hill Education, 2005
252005
A security framework for mobile-to-mobile payment network
ML Das, A Saxena, VP Gulati
2005 IEEE International Conference on Personal Wireless Communications, 2005 …, 2005
172005
Security issues in mobile data networks
D Nayak, N Rajendran, DB Phatak, VP Gulati
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3229-3233, 2004
162004
Oilseeds and edible oil economy of India
VP Gulati, SJ Phansalkar
141994
IT framework for the Indian Banking sector
VP Gulati, MV Sivakumaran, C Manogna
ASCI Journal of Management 31 (1), 67-77, 2002
102002
Modeling and evaluation of security architecture for wireless local area networks by indexing method: a novel approach
D Nayak, DB Phatak, VP Gulati
Information Security Practice and Experience: First International Conference …, 2005
82005
Preventing Technology Based Bank Frauds
V Radha, VP Gulati
Journal of Internet Banking and Commerce 9 (1), 2004
82004
Dynamic remote user authentication
A Saxena, ML Das, VP Gulati, DB Phatak
Proceedings of International Conference on Advanced Computing and …, 2004
82004
A note on the constrained shortest‐path problem
AK Pujari, S Agarwal, VP Gulati
Naval research logistics quarterly 31 (1), 87-89, 1984
81984
Frequency‐and ordering‐based similarity measure for host‐based intrusion detection
S Rawat, VP Gulati, AK Pujari
Information management & computer security 12 (5), 411-421, 2004
72004
The system can't perform the operation now. Try again later.
Articles 1–20