5,542 results on '"Rangan, C. Pandu"'
Search Results
2. Sharing of Encrypted Files in Blockchain Made Simpler
3. Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks
4. Two-Stage Framework for Accurate and Differentially Private Network Information Publication
5. Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts
6. A Closer Look at Anonymous Proxy Re-Encryption Schemes
7. Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks
8. Identity-Based Group Encryption Revisited
9. Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE
10. Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction
11. Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
12. Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters
13. A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
14. Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
15. Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality
16. Threshold Discernible Ring Signatures
17. Compact Stateful Encryption Schemes with Ciphertext Verifiability
18. ID Based Signcryption Scheme in Standard Model
19. Identity Based Online/Offline Encryption and Signcryption Schemes Revisited
20. Attribute Based Signatures for Bounded Multi-level Threshold Circuits
21. Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience
22. Cryptographic Approaches to Denial-of-Service Resistance
23. The Round Complexity of Verifiable Secret Sharing: The Statistical Case
24. Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience
25. Sanitizable Signatures with Strong Transparency in the Standard Model
26. Breaking and Building of Threshold Signcryption Schemes
27. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
28. Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding
29. Communication Optimal Multi-valued Asynchronous Broadcast Protocol
30. Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
31. Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
32. Certificateless KEM and Hybrid Signcryption Schemes Revisited
33. Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
34. Pathwidth and Searching in Parameterized Threshold Graphs
35. Variants of Spreading Messages
36. On Communication Complexity of Secure Message Transmission in Directed Networks
37. On Composability of Reliable Unicast and Broadcast
38. Breaking and Building of Group Inside Signature
39. Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience
40. Identity Based Aggregate Signcryption Schemes
41. On Exponential Lower Bound for Protocols for Reliable Communication in Networks
42. The Guarding Problem – Complexity and Approximation
43. Information Theoretically Secure Multi Party Set Intersection Re-visited
44. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
45. The Round Complexity of Verifiable Secret Sharing Revisited
46. Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
47. Core and Conditional Core Path of Specified Length in Special Classes of Graphs
48. On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks
49. Toward Optimal Player Weights in Secure Distributed Protocols
50. Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.