Search

Your search keyword '"Rangan, C. Pandu"' showing total 5,542 results

Search Constraints

Start Over You searched for: Author "Rangan, C. Pandu" Remove constraint Author: "Rangan, C. Pandu" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
5,542 results on '"Rangan, C. Pandu"'

Search Results

1. Forward Security Under Leakage Resilience, Revisited

4. Two-Stage Framework for Accurate and Differentially Private Network Information Publication

5. Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts

6. A Closer Look at Anonymous Proxy Re-Encryption Schemes

7. Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks

8. Identity-Based Group Encryption Revisited

9. Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE

10. Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction

13. A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory

14. Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme

15. Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality

16. Threshold Discernible Ring Signatures

17. Compact Stateful Encryption Schemes with Ciphertext Verifiability

18. ID Based Signcryption Scheme in Standard Model

19. Identity Based Online/Offline Encryption and Signcryption Schemes Revisited

20. Attribute Based Signatures for Bounded Multi-level Threshold Circuits

21. Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience

23. The Round Complexity of Verifiable Secret Sharing: The Statistical Case

24. Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience

25. Sanitizable Signatures with Strong Transparency in the Standard Model

26. Breaking and Building of Threshold Signcryption Schemes

27. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing

28. Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding

29. Communication Optimal Multi-valued Asynchronous Broadcast Protocol

30. Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience

31. Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles

32. Certificateless KEM and Hybrid Signcryption Schemes Revisited

33. Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience

34. Pathwidth and Searching in Parameterized Threshold Graphs

35. Variants of Spreading Messages

36. On Communication Complexity of Secure Message Transmission in Directed Networks

37. On Composability of Reliable Unicast and Broadcast

38. Breaking and Building of Group Inside Signature

39. Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience

40. Identity Based Aggregate Signcryption Schemes

41. On Exponential Lower Bound for Protocols for Reliable Communication in Networks

42. The Guarding Problem – Complexity and Approximation

43. Information Theoretically Secure Multi Party Set Intersection Re-visited

44. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme

45. The Round Complexity of Verifiable Secret Sharing Revisited

46. Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme

47. Core and Conditional Core Path of Specified Length in Special Classes of Graphs

48. On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks

50. Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary

Catalog

Books, media, physical & digital resources