Kapali Viswanathan
Kapali Viswanathan
Siemens Technology
Verified email at - Homepage
Cited by
Cited by
Robust, privacy protecting and publicly verifiable sealed-bid auction
K Peng, C Boyd, E Dawson, K Viswanathan
Information and Communications Security: 4th International Conference, ICICS …, 2002
A three phased schema for sealed bid auction system design
K Viswanathan, C Boyd, E Dawson
Australasian Conference on Information Security and Privacy, 412-426, 2000
Constructing secure hash functions by enhancing Merkle-Damgård construction
P Gauravaram, W Millan, E Dawson, K Viswanathan
Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006
A correct, private, and efficient mix network
K Peng, C Boyd, E Dawson, K Viswanathan
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
Five sealed-bid auction models
K Peng, C Boyd, E Dawson, K Viswanathan
Proceedings of the Australasian information security workshop conference on …, 2003
Secure e-voting for preferential elections
R Aditya, C Boyd, E Dawson, K Viswanathan
Electronic Government: Second International Conference, EGOV 2003, Prague …, 2003
NLHB: A non-linear Hopper-Blum protocol
M Madhavan, A Thangaraj, Y Sankarasubramanian, K Viswanathan
2010 IEEE International Symposium on Information Theory, 2498-2502, 2010
Non-interactive auction scheme with strong privacy
K Peng, C Boyd, E Dawson, K Viswanathan
Information Security and Cryptology—ICISC 2002: 5th International …, 2003
Finite-state wiretap channels: Secrecy under memory constraints
Y Sankarasubramaniam, A Thangaraj, K Viswanathan
2009 IEEE Information Theory Workshop, 115-119, 2009
Methods and systems for shared file storage
K Viswanathan, AK Gopalakrishnannair
US Patent App. 14/764,229, 2016
Secure document workflow
K Viswanathan, ASR Kuchibhotla, NA Matad
US Patent 8,477,379, 2013
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings
A Canteaut, K Viswanathan
Springer, 2005
Fault-tolerant secret key generation
H Tyagi, N Kashyap, Y Sankarasubramaniam, K Viswanathan
2012 IEEE International Symposium on Information Theory Proceedings, 1787-1791, 2012
NLHB: A light-weight, provably-secure variant of the HB protocol using simple non-linear functions
M Madhavan, A Thangaraj, K Viswanathan, Y Sankarasubramaniam
2010 national conference on communications (NCC), 1-5, 2010
Secured data transmission using identity-based cryptography
FL Templin, K Viswanathan
US Patent 10,050,946, 2018
Real-time communication security for automation networks
K Viswanathan, W Wiese, A Gopalan
US Patent 9,300,467, 2016
Architecture for a Delay-and-Disruption Tolerant Public-Key Distribution Network (PKDN)
K Viswanathan, F Templin, 2016
Topic based classification of documents
R Anantharangachar, P Chourasiya, V Kapaleeswaran, D Sudhir
US Patent App. 14/897,308, 2016
Printing system and method
S Godavari, K Viswanathan, ASR Kuchibhotla
US Patent 8,749,821, 2014
Denial of service issues in voice over ip networks
J Reid, A Clark, JMG Nieto, J Smith, K Viswanathan
Special Session on Security in VoIP Networks 2, 230-237, 2004
The system can't perform the operation now. Try again later.
Articles 1–20