A dynamic ID-based remote user authentication scheme ML Das, A Saxena, VP Gulati IEEE transactions on Consumer Electronics 50 (2), 629-631, 2004 | 808 | 2004 |
A novel remote user authentication scheme using bilinear pairings ML Das, A Saxena, VP Gulati, DB Phatak Computers & Security 25 (3), 184-189, 2006 | 172 | 2006 |
Intrusion detection using text processing techniques with a binary-weighted cosine metric S Rawat, VP Gulati, AK Pujari, VR Vemuri Journal of Information Assurance and Security 1 (1), 43-50, 2006 | 69 | 2006 |
Hierarchical key management scheme using polynomial interpolation ML Das, A Saxena, VP Gulati, DB Phatak ACM SIGOPS Operating Systems Review 39 (1), 40-47, 2005 | 64 | 2005 |
On the use of singular value decomposition for a fast intrusion detection system S Rawat, AK Pujari, VP Gulati Electronic Notes in Theoretical Computer Science 142, 215-228, 2006 | 48 | 2006 |
An efficient secure key issuing protocol in ID-based cryptosystems R Gangishetti, MC Gorantla, ML Das, A Saxena, VP Gulati International Conference on Information Technology: Coding and Computing …, 2005 | 39 | 2005 |
Network traffic analysis using singular value decomposition and multiscale transforms CS Sastry, S Rawat, AK Pujari, VP Gulati Information Sciences 177 (23), 5275-5291, 2007 | 33 | 2007 |
The empowered internet payment gateway VP Gulati, S Srivastava International Conference on E-Governance, 98-107, 2007 | 30 | 2007 |
An efficient proxy signature scheme with revocation ML Das, A Saxena, VP Gulati Informatica 15 (4), 455-464, 2004 | 29 | 2004 |
A fast host-based intrusion detection system using rough set theory S Rawat, VP Gulati, AK Pujari Transactions on Rough Sets IV, 144-161, 2005 | 28 | 2005 |
Information system audit and assurance DP Dube, VP Gulati Tata McGraw-Hill Education, 2005 | 27 | 2005 |
A security framework for mobile-to-mobile payment network ML Das, A Saxena, VP Gulati 2005 IEEE International Conference on Personal Wireless Communications, 2005 …, 2005 | 17 | 2005 |
Security issues in mobile data networks D Nayak, N Rajendran, DB Phatak, VP Gulati IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 5, 3229-3233, 2004 | 16 | 2004 |
Oilseeds and edible oil economy of India VP Gulati, SJ Phansalkar Vikas Pub. House, 1994 | 14 | 1994 |
IT framework for the Indian Banking sector VP Gulati, MV Sivakumaran, C Manogna ASCI Journal of Management 31 (1), 67-77, 2002 | 11 | 2002 |
Modeling and evaluation of security architecture for wireless local area networks by indexing method: A novel approach D Nayak, DB Phatak, VP Gulati Information Security Practice and Experience: First International Conference …, 2005 | 8 | 2005 |
Preventing Technology Based Bank Frauds V Radha, VP Gulati Journal of Internet Banking and Commerce 9 (1), 2004 | 8 | 2004 |
Dynamic remote user authentication A Saxena, ML Das, VP Gulati, DB Phatak Proceedings of International Conference on Advanced Computing and …, 2004 | 8 | 2004 |
A note on the constrained shortest‐path problem AK Pujari, S Agarwal, VP Gulati Naval research logistics quarterly 31 (1), 87-89, 1984 | 8 | 1984 |
Frequency‐and ordering‐based similarity measure for host‐based intrusion detection S Rawat, VP Gulati, AK Pujari Information management & computer security 12 (5), 411-421, 2004 | 7 | 2004 |