scispace - formally typeset
I

Inder Sarat Gopal

Researcher at IBM

Publications -  78
Citations -  3705

Inder Sarat Gopal is an academic researcher from IBM. The author has contributed to research in topics: Network packet & Packet switching. The author has an hindex of 34, co-authored 78 publications receiving 3695 citations.

Papers
More filters
Journal ArticleDOI

Paris: An approach to integrated high‐speed private networks

TL;DR: This paper describes a design of a high-speed packet switching system for integrated voice, video and data communications that makes use of a simplified network architecture in order to achieve the low packet delay and high nodal throughput necessary for the transport of voice and video.
Patent

Enabling seamless user mobility in a short-range wireless networking environment

TL;DR: In this article, the authors present methods, systems, and computer program instructions for enabling a variety of devices, particularly low-power hand-held devices, to travel seamlessly through a networking environment such as that encountered within a building by establishing connectivity to a plurality of network access points, which may be referred to as Handoff Management Points (HMPs) (110).
Book ChapterDOI

Systematic Design of Two-Party Authentication Protocols

TL;DR: A new authenticated exchange protocol is presented which is both provably secure and highly efficient and practical, and prevents chosen plaintext or ciphertext attacks on the cryptosystem.
Patent

Locating resources in computer networks

TL;DR: A LOCATE search dynamically locates resources (e.g., logical units (LUs) and transaction program and files associated with LUs) in a computer network so that a session can be established between the origin and the destination of the search.
Journal ArticleDOI

Systematic design of a family of attack-resistant authentication protocols

TL;DR: A methodology for systematically building and testing the security of a family of cryptographic two-way authentication protocols that are as simple as possible yet resistant to a wide class of attacks, efficient, easy to implement and use, and amenable to many different networking environments is described.