Search

Your search keyword '"Rangan, C. Pandu"' showing total 3,482 results

Search Constraints

Start Over You searched for: Author "Rangan, C. Pandu" Remove constraint Author: "Rangan, C. Pandu" Database Complementary Index Remove constraint Database: Complementary Index
3,482 results on '"Rangan, C. Pandu"'

Search Results

1. Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes.

2. On the Trade-Off between Network Connectivity, Round Complexity, and Communication Complexity of Reliable Message Transmission.

3. Cache Me if You Can: Capacitated Selfish Replication Games in Networks.

5. Lattice-based identity-based resplittable threshold public key encryption scheme.

8. Lattice Based Mix Network for Location Privacy in Mobile System.

10. Obstacles Incentivize Human Learning: A Network Theoretic Study.

13. Identity based partial aggregate signature scheme without pairing.

15. Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding.

17. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing.

18. Sanitizable Signatures with Strong Transparency in the Standard Model.

19. Breaking and Building of Threshold Signcryption Schemes.

20. Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience.

21. Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.

22. Certificateless KEM and Hybrid Signcryption Schemes Revisited.

23. Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.

24. The Round Complexity of Verifiable Secret Sharing: The Statistical Case.

25. Communication Optimal Multi-valued Asynchronous Broadcast Protocol.

28. Pathwidth and Searching in Parameterized Threshold Graphs.

29. Variants of Spreading Messages.

30. On Communication Complexity of Secure Message Transmission in Directed Networks.

31. On Composability of Reliable Unicast and Broadcast.

32. Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience.

34. Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience.

35. Identity Based Aggregate Signcryption Schemes.

36. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.

37. Cryptanalysis of Mu et al.΄s and Li et al.΄s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.

38. Core and Conditional Core Path of Specified Length in Special Classes of Graphs.

39. On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks.

40. On Exponential Lower Bound for Protocols for Reliable Communication in Networks.

41. Information Theoretically Secure Multi Party Set Intersection Re-visited.

42. The Round Complexity of Verifiable Secret Sharing Revisited.

43. The Guarding Problem – Complexity and Approximation.

46. Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.

47. Round Efficient Unconditionally Secure Multiparty Computation Protocol.

48. Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary.

49. Unconditionally Reliable Message Transmission in Directed Hypergraphs.

Catalog

Books, media, physical & digital resources