26 results on '"Rangan, C. Pandu"'
Search Results
2. Splitting and Aggregating Signatures in Cryptocurrency Protocols
3. Certificateless Proxy Re-Encryption Without Pairing
4. Group key establishment (GKE): Two/three party key exchange to GKE
5. Identity based partial aggregate signature scheme without pairing
6. A special purpose proxy re-signature scheme
7. Identity Based Self Delegated Signature - Self Proxy Signatures
8. On the Security of Identity Based Threshold Unsigncryption Schemes
9. Brief announcement
10. Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary
11. Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
12. RSA-TBOS signcryption with proxy re-encryption
13. Data structures for limited oblivious execution of programs while preserving locality of reference
14. On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication
15. Playing push vs pull
16. Possibility and complexity of probabilistic reliable communication in directed networks
17. Brief announcement
18. Obstacles Incentivize Human Learning: A Network Theoretic Study.
19. CCA secure certificateless encryption schemes based on RSA.
20. Distributed consensus in the presence of sectional faults
21. Brief announcement
22. An identity based ring signcryption scheme with public verifiability.
23. Forcing out a confession: Threshold discernible ring signatures.
24. Unconditionally reliable message transmission in directed networks.
25. Data structures for limited oblivious execution of programs while preserving locality of reference.
26. On perfectly secure communication over arbitrary networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.