R
Ravi Ganesan
Researcher at VMware
Publications - 40
Citations - 2615
Ravi Ganesan is an academic researcher from VMware. The author has contributed to research in topics: Public-key cryptography & Payment. The author has an hindex of 23, co-authored 40 publications receiving 2614 citations. Previous affiliations of Ravi Ganesan include Silver Spring Networks.
Papers
More filters
Patent
Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
TL;DR: In this paper, the security of communications over the system is enhanced by a first user generating a temporary asymmetric crypto-key having a first temporary key and an associated second temporary key portion.
Patent
System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
TL;DR: In this paper, a split key public encryption (KSPE) scheme was proposed to encrypt and decrypt encrypted and decrypted messages exchanged during a communications session with the first and second users.
Patent
Cashless transactions without credit cards, debit cards or checks
TL;DR: In this paper, the authors describe a system for registering a purchaser of a product without identifying a payment account for the purchaser, using a central processing point to determine if the registered purchaser is a registered purchaser.
Patent
Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography
TL;DR: In this paper, a method for securing stored files in a system having a plurality of system users with each system user having an associated asymmetric crypto-key with a public key portion and a corresponding private key portion is provided.
Patent
Technique of registration for and direction of electronic payments in real-time
TL;DR: In this paper, a payment service provider receives information identifying both a network user and the bank account, and a request to make a payment on behalf of the network user is processed for verification.