Robust, privacy protecting and publicly verifiable sealed-bid auction K Peng, C Boyd, E Dawson, K Viswanathan Information and Communications Security: 4th International Conference, ICICS …, 2002 | 65 | 2002 |
A three phased schema for sealed bid auction system design K Viswanathan, C Boyd, E Dawson Australasian Conference on Information Security and Privacy, 412-426, 2000 | 58 | 2000 |
Constructing secure hash functions by enhancing Merkle-Damgård construction P Gauravaram, W Millan, E Dawson, K Viswanathan Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006 | 55 | 2006 |
A correct, private, and efficient mix network K Peng, C Boyd, E Dawson, K Viswanathan Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004 | 55 | 2004 |
Five sealed-bid auction models K Peng, C Boyd, E Dawson, K Viswanathan Proceedings of the Australasian information security workshop conference on …, 2003 | 36 | 2003 |
Secure e-voting for preferential elections R Aditya, C Boyd, E Dawson, K Viswanathan Electronic Government: Second International Conference, EGOV 2003, Prague …, 2003 | 25 | 2003 |
NLHB: A non-linear Hopper-Blum protocol M Madhavan, A Thangaraj, Y Sankarasubramanian, K Viswanathan 2010 IEEE International Symposium on Information Theory, 2498-2502, 2010 | 24 | 2010 |
Non-interactive auction scheme with strong privacy K Peng, C Boyd, E Dawson, K Viswanathan Information Security and Cryptology—ICISC 2002: 5th International …, 2003 | 21 | 2003 |
Finite-state wiretap channels: Secrecy under memory constraints Y Sankarasubramaniam, A Thangaraj, K Viswanathan 2009 IEEE Information Theory Workshop, 115-119, 2009 | 19 | 2009 |
Methods and systems for shared file storage K Viswanathan, AK Gopalakrishnannair US Patent App. 14/764,229, 2016 | 18 | 2016 |
Secure document workflow K Viswanathan, ASR Kuchibhotla, NA Matad US Patent 8,477,379, 2013 | 13 | 2013 |
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings A Canteaut, K Viswanathan Springer, 2005 | 10* | 2005 |
Fault-tolerant secret key generation H Tyagi, N Kashyap, Y Sankarasubramaniam, K Viswanathan 2012 IEEE International Symposium on Information Theory Proceedings, 1787-1791, 2012 | 8 | 2012 |
NLHB: A light-weight, provably-secure variant of the HB protocol using simple non-linear functions M Madhavan, A Thangaraj, K Viswanathan, Y Sankarasubramaniam 2010 national conference on communications (NCC), 1-5, 2010 | 8 | 2010 |
Secured data transmission using identity-based cryptography FL Templin, K Viswanathan US Patent 10,050,946, 2018 | 7 | 2018 |
Real-time communication security for automation networks K Viswanathan, W Wiese, A Gopalan US Patent 9,300,467, 2016 | 7 | 2016 |
Architecture for a Delay-and-Disruption Tolerant Public-Key Distribution Network (PKDN) K Viswanathan, F Templin https://tools.ietf.org/html/draft-viswanathan-dtnwg-pkdn-00, 2016 | 6 | 2016 |
Topic based classification of documents R Anantharangachar, P Chourasiya, V Kapaleeswaran, D Sudhir US Patent App. 14/897,308, 2016 | 6 | 2016 |
Printing system and method S Godavari, K Viswanathan, ASR Kuchibhotla US Patent 8,749,821, 2014 | 6 | 2014 |
Denial of service issues in voice over ip networks J Reid, A Clark, JMG Nieto, J Smith, K Viswanathan Special Session on Security in VoIP Networks 2, 230-237, 2004 | 6 | 2004 |