Search

Your search keyword '"Rangan, C. Pandu"' showing total 6,211 results

Search Constraints

Start Over You searched for: Author "Rangan, C. Pandu" Remove constraint Author: "Rangan, C. Pandu" Publisher springer nature Remove constraint Publisher: springer nature
6,211 results on '"Rangan, C. Pandu"'

Search Results

1. Cache Me if You Can: Capacitated Selfish Replication Games in Networks.

8. Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding.

9. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing.

10. Sanitizable Signatures with Strong Transparency in the Standard Model.

11. Breaking and Building of Threshold Signcryption Schemes.

12. Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience.

13. Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.

14. Certificateless KEM and Hybrid Signcryption Schemes Revisited.

15. Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.

16. The Round Complexity of Verifiable Secret Sharing: The Statistical Case.

17. Communication Optimal Multi-valued Asynchronous Broadcast Protocol.

18. Pathwidth and Searching in Parameterized Threshold Graphs.

19. Variants of Spreading Messages.

20. On Communication Complexity of Secure Message Transmission in Directed Networks.

21. On Composability of Reliable Unicast and Broadcast.

22. Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience.

23. Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience.

24. Identity Based Aggregate Signcryption Schemes.

25. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.

26. Cryptanalysis of Mu et al.΄s and Li et al.΄s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.

27. Core and Conditional Core Path of Specified Length in Special Classes of Graphs.

28. On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks.

29. On Exponential Lower Bound for Protocols for Reliable Communication in Networks.

30. Information Theoretically Secure Multi Party Set Intersection Re-visited.

31. The Round Complexity of Verifiable Secret Sharing Revisited.

32. The Guarding Problem – Complexity and Approximation.

33. Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.

34. Round Efficient Unconditionally Secure Multiparty Computation Protocol.

35. Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary.

36. Unconditionally Reliable Message Transmission in Directed Hypergraphs.

38. Rational Secret Sharing with Repeated Games.

39. Processing Sequential Patterns in Relational Databases.

40. A Tool for Evaluating Ontology Alignment Strategies.

41. SomeRDFS in the Semantic Web.

42. Metadata Management in a Multiversion Data Warehouse.

43. GeRoMe: A Generic Role Based Metamodel for Model Management.

44. Encoding Classifications into Lightweight Ontologies.

45. Context Dependency Management in Ontology Engineering: A Formal Approach.

46. Default Clustering with Conceptual Structures.

47. Performance Evaluation of Non-persistent CSMA as Anti-collision Protocol for Active RFID Tags.

48. CDMA Power Control Using Channel Prediction in Mobile Fading Channels.

49. Cognitive Radio Based Bandwidth Sharing Among Heterogeneous OFDM Access Systems.

50. An Efficient Heterogeneous Wireless Access Based on Region and Time Partitioning in D-TDD OFDM Systems.

Catalog

Books, media, physical & digital resources