Follow
Kapali Viswanathan
Kapali Viswanathan
Siemens Technology
Verified email at siemens.com - Homepage
Title
Cited by
Cited by
Year
Robust, privacy protecting and publicly verifiable sealed-bid auction
K Peng, C Boyd, E Dawson, K Viswanathan
International Conference on Information and Communications Security, 147-159, 2002
632002
A three phased schema for sealed bid auction system design
K Viswanathan, C Boyd, E Dawson
Australasian Conference on Information Security and Privacy, 412-426, 2000
562000
Constructing secure hash functions by enhancing Merkle-Damgård construction
P Gauravaram, W Millan, E Dawson, K Viswanathan
Australasian Conference on Information Security and Privacy, 407-420, 2006
552006
A correct, private, and efficient mix network
K Peng, C Boyd, E Dawson, K Viswanathan
International Workshop on Public Key Cryptography, 439-454, 2004
492004
Five sealed-bid auction models
K Peng, C Boyd, E Dawson, K Viswanathan
ACSW Frontiers 2003, 77-86, 2003
332003
NLHB: A non-linear Hopper-Blum protocol
M Madhavan, A Thangaraj, Y Sankarasubramanian, K Viswanathan
2010 IEEE International Symposium on Information Theory, 2498-2502, 2010
222010
Secure e-voting for preferential elections
R Aditya, C Boyd, E Dawson, K Viswanathan
International Conference on Electronic Government, 246-249, 2003
212003
Non-interactive auction scheme with strong privacy
K Peng, C Boyd, E Dawson, K Viswanathan
International Conference on Information Security and Cryptology, 407-420, 2002
202002
Finite-state wiretap channels: Secrecy under memory constraints
Y Sankarasubramaniam, A Thangaraj, K Viswanathan
2009 IEEE Information Theory Workshop, 115-119, 2009
182009
Methods and systems for shared file storage
K Viswanathan, AK Gopalakrishnannair
US Patent App. 14/764,229, 2016
162016
Secure document workflow
K Viswanathan, ASR Kuchibhotla, NA Matad
US Patent 8,477,379, 2013
122013
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings
A Canteaut, K Viswanathan
Springer, 2005
9*2005
Fault-tolerant secret key generation
H Tyagi, N Kashyap, Y Sankarasubramaniam, K Viswanathan
2012 IEEE International Symposium on Information Theory Proceedings, 1787-1791, 2012
82012
NLHB: A light-weight, provably-secure variant of the HB protocol using simple non-linear functions
M Madhavan, A Thangaraj, K Viswanathan, Y Sankarasubramaniam
2010 national conference on communications (NCC), 1-5, 2010
82010
Key recovery system for the commercial environment
JG Nieto, K Viswanathan, C Boyd, E Dawson
ACISP, 149-162, 2000
72000
Publicly verifiable key escrow with limited time span
K Viswanathan, C Boyd, E Dawson
Australasian Conference on Information Security and Privacy, 36-50, 1999
71999
Secured data transmission using identity-based cryptography
FL Templin, K Viswanathan
US Patent 10,050,946, 2018
62018
Architecture for a Delay-and-Disruption Tolerant Public-Key Distribution Network (PKDN)
K Viswanathan, F Templin
https://tools.ietf.org/html/draft-viswanathan-dtnwg-pkdn-00, 2016
62016
Real-time communication security for automation networks
K Viswanathan, W Wiese, A Gopalan
US Patent 9,300,467, 2016
62016
Printing system and method
S Godavari, K Viswanathan, ASR Kuchibhotla
US Patent 8,749,821, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20