Research Publications

Papers Published in 2003
  • "Information Security Framework for Banking and Financial Sector"
    -- in Proceedings of National Conference on e-Information Security in Banking & Financial Sector: Issues Challenges – [February 11-12, 2003], by D. P. Dube and V. P. Gulati.
  • "Risk in Internet Banking"
    -- in IBA Journal, published by the Indian Banks' Association, [September 2003], Vol XXV, No.9, Page Nos. 24 to 29, by Ashutosh Saxena.
  • "Indian Banking: Global Benchmarks 2003"
    -- in Proceedings of the Conference on FICCI, Mumbai [September 2003], pp. 43-61 "Innovations in IT and Banking", by V. P. Gulati.
  • "Technologies for E-Commerce: India Initiatives"
    -- accepted at IEEE TENCON, [14th to 17th October 2003], by Ashutosh Saxena and AR Dani.
  • "Cryptanalysis of Stereotype Message Transmission"
    -- in proceedings of the National Workshop on Cryptology, Chennai, India, [16th to 18th October, 2003], by Pankaj Kapoor, Manik Lal Das, Ashutosh Saxena and V. P. Gulati.
  • "Security Analysis of Lal and Awasthi's Proxy Signature Schemes"
    -- in International Association for Cryptology Research, ePrint Report No. 2003/263, [2003], by Manik Lal Das, Ashutosh Saxena, V P Gulati.
  • "Elliptic Curve -- A new Direction to Future Cryptography"
    -- in proceedings of the National Workshop on Cryptology, [2003], by N. Rajendran, Debabrata Nayak, D. B. Phatak and V. P. Gulati.
  • "Security Issues in Mobile Data Networks"
    -- in proceedings of the National Workshop on Cryptology – [2003], by N. Rajendran, Debabrata Nayak, D. B. Phatak and V. P. Gulati.
  • "Security Issues in Wireless Data Networks"
    -- in proceedings of the National Workshop on Cryptology – [2003] by N. Rajendran, Debabrata Nayak, D. B. Phatak and V. P. Gulati.
  • "An Intrusion Detection Scheme based on Frequency and Ordering"
    -- accepted for the Information Management and Computer Security Journal, by Sanjay Rawat, V.P. Gulati and Arun K. Pujari.
  • "New Algorithms for Multi-objective Shortest Path Problem"
    -- published in OPSEARCH, Vol.40, No.4, pp.278-298, 2003, by V. N. Sastry, T. N. Janakiraman and Ismail Mohideen.
  • "Preventing Technology Based Bank Frauds"
    -- published in The CID Review, Journal of Crime Branch, CID, Tamil Nadu, March 2003, Vol III, Issue: 3, pp 31-44, by V. P. Gulati and V. Radha.
  • "On Determination of Efficient Key Pair"
    -- published in Journal of IE, Vol. 84, [May 2003] by V. P. Gulati, Ashutosh Saxena and Divya Nalla.
  • "A Key Management Scheme Based on Collision-resistant Hash Function and Polynomial Interpolations"
    -- in proceedings of the International Conference on Number Theory for Secure Communications [December 20-21, 2003], by Manik Lal Das, Ashutosh Saxena, V. P. Gulati and Deepak B Phatak.
  • "IM for Knowledge Management"
    -- in IBA BECON-2003 Volume, 11-12 [December 2003], pp, by Ashutosh Saxena.
  • "Proxy Signatures Using Partial Delegation with Warrant"
    -- in proceedings of the International Conference on Number Theory for Secure Communications, [December 20-21, 2003], by Manik Lal Das, Ashutosh Saxena and V. P. Gulati.
  • "Appcast – A Low Stress and High Stretch Overlay Protocol"
    -- in Proceedings of the 2nd International Workshop on Grid and Cooperative Computing, 2003, Shanghai, China [Dec. 2003], Vol. II, pp. 967 – 978, by V. P. Gulati, V. Radha and Arun K. Pujari.