Papers Published in 2003 |
- "Information Security Framework for Banking and Financial Sector"
-- in Proceedings of National Conference on e-Information Security in Banking & Financial Sector: Issues Challenges – [February 11-12, 2003], by D. P. Dube and V. P. Gulati.
|
- "Risk in Internet Banking"
-- in IBA Journal, published by the Indian Banks' Association, [September 2003], Vol XXV, No.9, Page Nos. 24 to 29, by Ashutosh Saxena.
|
- "Indian Banking: Global Benchmarks 2003"
-- in Proceedings of the Conference on FICCI, Mumbai [September 2003], pp. 43-61 "Innovations in IT and Banking", by V. P. Gulati.
|
- "Technologies for E-Commerce: India Initiatives"
-- accepted at IEEE TENCON, [14th to 17th October 2003], by Ashutosh Saxena and AR Dani.
|
- "Cryptanalysis of Stereotype Message Transmission"
-- in proceedings of the National Workshop on Cryptology, Chennai, India, [16th to 18th October, 2003], by Pankaj Kapoor, Manik Lal Das, Ashutosh Saxena and V. P. Gulati.
|
- "Security Analysis of Lal and Awasthi's Proxy Signature Schemes"
-- in International Association for Cryptology Research, ePrint Report No. 2003/263, [2003], by Manik Lal Das, Ashutosh Saxena, V P Gulati.
|
- "Elliptic Curve -- A new Direction to Future Cryptography"
-- in proceedings of the National Workshop on Cryptology, [2003], by N. Rajendran, Debabrata Nayak, D. B. Phatak and V. P. Gulati.
|
- "Security Issues in Mobile Data Networks"
-- in proceedings of the National Workshop on Cryptology – [2003], by N. Rajendran, Debabrata Nayak, D. B. Phatak and V. P. Gulati.
|
- "Security Issues in Wireless Data Networks"
-- in proceedings of the National Workshop on Cryptology – [2003] by N. Rajendran, Debabrata Nayak, D. B. Phatak and V. P. Gulati.
|
- "An Intrusion Detection Scheme based on Frequency and Ordering"
-- accepted for the Information Management and Computer Security Journal, by Sanjay Rawat, V.P. Gulati and Arun K. Pujari.
|
- "New Algorithms for Multi-objective Shortest Path Problem"
-- published in OPSEARCH, Vol.40, No.4, pp.278-298, 2003, by V. N. Sastry, T. N. Janakiraman and Ismail Mohideen.
|
- "Preventing Technology Based Bank Frauds"
-- published in The CID Review, Journal of Crime Branch, CID, Tamil Nadu, March 2003, Vol III, Issue: 3, pp 31-44, by V. P. Gulati and V. Radha.
|
- "On Determination of Efficient Key Pair"
-- published in Journal of IE, Vol. 84, [May 2003] by V. P. Gulati, Ashutosh Saxena and Divya Nalla.
|
- "A Key Management Scheme Based on Collision-resistant Hash Function and Polynomial Interpolations"
-- in proceedings of the International Conference on Number Theory for Secure Communications [December 20-21, 2003], by Manik Lal Das, Ashutosh Saxena, V. P. Gulati and Deepak B Phatak.
|
- "IM for Knowledge Management"
-- in IBA BECON-2003 Volume, 11-12 [December 2003], pp, by Ashutosh Saxena.
|
- "Proxy Signatures Using Partial Delegation with Warrant"
-- in proceedings of the International Conference on Number Theory for Secure Communications, [December 20-21, 2003], by Manik Lal Das, Ashutosh Saxena and V. P. Gulati.
|
- "Appcast – A Low Stress and High Stretch Overlay Protocol"
-- in Proceedings of the 2nd International Workshop on Grid and Cooperative Computing, 2003, Shanghai, China [Dec. 2003], Vol. II, pp. 967 – 978, by V. P. Gulati, V. Radha and Arun K. Pujari.
|