11,932 results on '"Rangan, C. Pandu"'
Search Results
152. The Study of Stable Marriage Problem with Ties and Incomplete Bounded Length Preference List under Social Stability
153. A linear space algorithm for the LCS problem
154. Certificateless Proxy Re-Encryption Without Pairing
155. Lattice Based Mix Network for Location Privacy in Mobile System
156. A simple implementation of Warshall's algorithm on a vlsi chip
157. Treewidth of circular-arc graphs+
158. Alternative Protocols for Generalized Oblivious Transfer
159. Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
160. Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
161. Steganographic Communication in Ordered Channels
162. Rational Secret Sharing with Repeated Games
163. Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
164. Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality
165. On Optimal Probabilistic Asynchronous Byzantine Agreement
166. Lattice-based identity-based resplittable threshold public key encryption scheme
167. Asynchronous Byzantine Agreement with optimal resilience
168. On the Generative Power of Simple H Systems
169. Lattice-based identity-based resplittable threshold public key encryption scheme.
170. Group key establishment (GKE): Two/three party key exchange to GKE
171. Identity based partial aggregate signature scheme without pairing
172. A special purpose proxy re-signature scheme
173. Variants of Spreading Messages
174. Identity Based Self Delegated Signature - Self Proxy Signatures
175. On the Security of Identity Based Threshold Unsigncryption Schemes
176. Brief announcement
177. Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality
178. Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary
179. Perfectly reliable and secure message transmission tolerating mobile adversary
180. Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
181. RSA-TBOS signcryption with proxy re-encryption
182. Data structures for limited oblivious execution of programs while preserving locality of reference
183. On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication
184. Playing push vs pull
185. Possibility and complexity of probabilistic reliable communication in directed networks
186. Brief announcement
187. Obstacles Incentivize Human Learning: A Network Theoretic Study.
188. Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding.
189. CCA secure certificateless encryption schemes based on RSA.
190. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing.
191. Sanitizable Signatures with Strong Transparency in the Standard Model.
192. Breaking and Building of Threshold Signcryption Schemes.
193. Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience.
194. Distributed consensus in the presence of sectional faults
195. Brief announcement
196. An identity based ring signcryption scheme with public verifiability.
197. Forcing out a confession: Threshold discernible ring signatures.
198. Unconditionally reliable message transmission in directed networks.
199. Data structures for limited oblivious execution of programs while preserving locality of reference.
200. Processing Sequential Patterns in Relational Databases.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.