Follow
Kapali Viswanathan
Kapali Viswanathan
Siemens Technology
Verified email at siemens.com - Homepage
Title
Cited by
Cited by
Year
Robust, privacy protecting and publicly verifiable sealed-bid auction
K Peng, C Boyd, E Dawson, K Viswanathan
Information and Communications Security: 4th International Conference, ICICS …, 2002
652002
A three phased schema for sealed bid auction system design
K Viswanathan, C Boyd, E Dawson
Information Security and Privacy: 5th Australasian Conference, ACISP 2000 …, 2000
592000
Constructing secure hash functions by enhancing Merkle-Damgård construction
P Gauravaram, W Millan, E Dawson, K Viswanathan
Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006
532006
A correct, private, and efficient mix network
K Peng, C Boyd, E Dawson, K Viswanathan
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
472004
Five sealed-bid auction models
K Peng, C Boyd, E Dawson, K Viswanathan
Proceedings of the Australasian information security workshop conference on …, 2003
352003
NLHB: A non-linear Hopper-Blum protocol
M Madhavan, A Thangaraj, Y Sankarasubramanian, K Viswanathan
2010 IEEE International Symposium on Information Theory, 2498-2502, 2010
242010
Secure e-voting for preferential elections
R Aditya, C Boyd, E Dawson, K Viswanathan
Electronic Government: Second International Conference, EGOV 2003, Prague …, 2003
212003
Non-interactive auction scheme with strong privacy
K Peng, C Boyd, E Dawson, K Viswanathan
Information Security and Cryptology—ICISC 2002: 5th International …, 2003
212003
Finite-state wiretap channels: Secrecy under memory constraints
Y Sankarasubramaniam, A Thangaraj, K Viswanathan
2009 IEEE Information Theory Workshop, 115-119, 2009
192009
Methods and systems for shared file storage
K Viswanathan, AK Gopalakrishnannair
US Patent App. 14/764,229, 2016
182016
Secure document workflow
K Viswanathan, ASR Kuchibhotla, NA Matad
US Patent 8,477,379, 2013
132013
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings
A Canteaut, K Viswanathan
Springer, 2005
10*2005
Fault-tolerant secret key generation
H Tyagi, N Kashyap, Y Sankarasubramaniam, K Viswanathan
2012 IEEE International Symposium on Information Theory Proceedings, 1787-1791, 2012
82012
NLHB: A light-weight, provably-secure variant of the HB protocol using simple non-linear functions
M Madhavan, A Thangaraj, K Viswanathan, Y Sankarasubramaniam
2010 national conference on communications (NCC), 1-5, 2010
82010
Publicly verifiable key escrow with limited time span
K Viswanathan, C Boyd, E Dawson
Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999
81999
Real-time communication security for automation networks
K Viswanathan, W Wiese, A Gopalan
US Patent 9,300,467, 2016
72016
Key recovery system for the commercial environment
JG Nieto, K Viswanathan, C Boyd, E Dawson
ACISP, 149-162, 2000
72000
Secured data transmission using identity-based cryptography
FL Templin, K Viswanathan
US Patent 10,050,946, 2018
62018
Architecture for a Delay-and-Disruption Tolerant Public-Key Distribution Network (PKDN)
K Viswanathan, F Templin
https://tools.ietf.org/html/draft-viswanathan-dtnwg-pkdn-00, 2016
62016
Printing system and method
S Godavari, K Viswanathan, ASR Kuchibhotla
US Patent 8,749,821, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20