Ved Prakash Gulati
Ved Prakash Gulati
Verified email at
Cited by
Cited by
A dynamic ID-based remote user authentication scheme
ML Das, A Saxena, VP Gulati
IEEE transactions on Consumer Electronics 50 (2), 629-631, 2004
A novel remote user authentication scheme using bilinear pairings
ML Das, A Saxena, VP Gulati, DB Phatak
Computers & Security 25 (3), 184-189, 2006
Intrusion detection using text processing techniques with a binary-weighted cosine metric
S Rawat, VP Gulati, AK Pujari, VR Vemuri
Journal of Information Assurance and Security 1 (1), 43-50, 2006
Hierarchical key management scheme using polynomial interpolation
ML Das, A Saxena, VP Gulati, DB Phatak
ACM SIGOPS Operating Systems Review 39 (1), 40-47, 2005
On the use of singular value decomposition for a fast intrusion detection system
S Rawat, AK Pujari, VP Gulati
Electronic Notes in Theoretical Computer Science 142, 215-228, 2006
An efficient secure key issuing protocol in ID-based cryptosystems
R Gangishetti, MC Gorantla, ML Das, A Saxena, VP Gulati
International Conference on Information Technology: Coding and Computing …, 2005
Network traffic analysis using singular value decomposition and multiscale transforms
CS Sastry, S Rawat, AK Pujari, VP Gulati
Information Sciences 177 (23), 5275-5291, 2007
An efficient proxy signature scheme with revocation
ML Das, A Saxena, VP Gulati
Informatica 15 (4), 455-464, 2004
The empowered internet payment gateway
VP Gulati, S Srivastava
International Conference on E-Governance, 98-107, 2007
A fast host-based intrusion detection system using rough set theory
S Rawat, VP Gulati, AK Pujari
Transactions on Rough Sets IV, 144-161, 2005
Information system audit and assurance
DP Dube, VP Gulati
Tata McGraw-Hill Education, 2005
A security framework for mobile-to-mobile payment network
ML Das, A Saxena, VP Gulati
2005 IEEE International Conference on Personal Wireless Communications, 2005 …, 2005
Security issues in mobile data networks
D Nayak, N Rajendran, DB Phatak, VP Gulati
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3229-3233, 2004
Oilseeds and edible oil economy of India
VP Gulati, SJ Phansalkar
IT framework for the Indian Banking sector
VP Gulati, MV Sivakumaran, C Manogna
ASCI Journal of Management 31 (1), 67-77, 2002
Preventing Technology Based Bank Frauds
V Radha, VP Gulati
Journal of Internet Banking and Commerce 9 (1), 2004
Dynamic remote user authentication
A Saxena, ML Das, VP Gulati, DB Phatak
Proceedings of International Conference on Advanced Computing and …, 2004
A note on the constrained shortest‐path problem
AK Pujari, S Agarwal, VP Gulati
Naval research logistics quarterly 31 (1), 87-89, 1984
Modeling and evaluation of security architecture for wireless local area networks by indexing method: a novel approach
D Nayak, DB Phatak, VP Gulati
Information Security Practice and Experience: First International Conference …, 2005
Frequency‐and ordering‐based similarity measure for host‐based intrusion detection
S Rawat, VP Gulati, AK Pujari
Information management & computer security 12 (5), 411-421, 2004
The system can't perform the operation now. Try again later.
Articles 1–20