Follow
Kapali Viswanathan
Kapali Viswanathan
Siemens Technology
Verified email at siemens.com - Homepage
Title
Cited by
Cited by
Year
Robust, privacy protecting and publicly verifiable sealed-bid auction
K Peng, C Boyd, E Dawson, K Viswanathan
Information and Communications Security: 4th International Conference, ICICS …, 2002
652002
A three phased schema for sealed bid auction system design
K Viswanathan, C Boyd, E Dawson
Australasian Conference on Information Security and Privacy, 412-426, 2000
582000
A correct, private, and efficient mix network
K Peng, C Boyd, E Dawson, K Viswanathan
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
562004
Constructing secure hash functions by enhancing Merkle-Damgård construction
P Gauravaram, W Millan, E Dawson, K Viswanathan
Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006
552006
Five sealed-bid auction models
K Peng, C Boyd, E Dawson, K Viswanathan
Proceedings of the Australasian information security workshop conference on …, 2003
362003
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings
A Canteaut, K Viswanathan
Springer, 2005
25*2005
Secure e-voting for preferential elections
R Aditya, C Boyd, E Dawson, K Viswanathan
Electronic Government: Second International Conference, EGOV 2003, Prague …, 2003
252003
NLHB: A non-linear Hopper-Blum protocol
M Madhavan, A Thangaraj, Y Sankarasubramanian, K Viswanathan
2010 IEEE International Symposium on Information Theory, 2498-2502, 2010
242010
Non-interactive auction scheme with strong privacy
K Peng, C Boyd, E Dawson, K Viswanathan
Information Security and Cryptology—ICISC 2002: 5th International …, 2003
212003
Methods and systems for shared file storage
K Viswanathan, AK Gopalakrishnannair
US Patent App. 14/764,229, 2016
192016
Finite-state wiretap channels: Secrecy under memory constraints
Y Sankarasubramaniam, A Thangaraj, K Viswanathan
2009 IEEE Information Theory Workshop, 115-119, 2009
192009
Secure document workflow
K Viswanathan, ASR Kuchibhotla, NA Matad
US Patent 8,477,379, 2013
132013
Fault-tolerant secret key generation
H Tyagi, N Kashyap, Y Sankarasubramaniam, K Viswanathan
2012 IEEE International Symposium on Information Theory Proceedings, 1787-1791, 2012
82012
NLHB: A light-weight, provably-secure variant of the HB protocol using simple non-linear functions
M Madhavan, A Thangaraj, K Viswanathan, Y Sankarasubramaniam
2010 national conference on communications (NCC), 1-5, 2010
82010
Secured data transmission using identity-based cryptography
FL Templin, K Viswanathan
US Patent 10,050,946, 2018
72018
Architecture for a Delay-and-Disruption Tolerant Public-Key Distribution Network (PKDN)
K Viswanathan, F Templin
https://tools.ietf.org/html/draft-viswanathan-dtnwg-pkdn-00, 2016
72016
Real-time communication security for automation networks
K Viswanathan, W Wiese, A Gopalan
US Patent 9,300,467, 2016
72016
Topic based classification of documents
R Anantharangachar, P Chourasiya, V Kapaleeswaran, D Sudhir
US Patent App. 14/897,308, 2016
62016
Printing system and method
S Godavari, K Viswanathan, ASR Kuchibhotla
US Patent 8,749,821, 2014
62014
Detecting modifications in paper documents: a coding approach
Y Sankarasubramaniam, B Narayanan, K Viswanathan, A Kuchibhotla
Document Recognition and Retrieval XVII 7534, 88-99, 2010
62010
The system can't perform the operation now. Try again later.
Articles 1–20