Search

Your search keyword '"Prabhakaran, Vinod M."' showing total 299 results

Search Constraints

Start Over You searched for: Author "Prabhakaran, Vinod M." Remove constraint Author: "Prabhakaran, Vinod M."
299 results on '"Prabhakaran, Vinod M."'

Search Results

1. Broadcast Channel Synthesis from Shared Randomness

2. Maximal Guesswork Leakage

3. Byzantine Multiple Access Channels -- Part II: Communication With Adversary Identification

4. Randomness Requirements for Three-Secret Sharing

5. Hypothesis Testing for Adversarial Channels: Chernoff-Stein Exponents

6. Byzantine Multiple Access Channels -- Part I: Reliable Communication

7. Consensus Capacity of Noisy Broadcast Channels

8. Compound Arbitrarily Varying Channels

9. Communication With Adversary Identification in Byzantine Multiple Access Channels

10. Multiple Access Channel Simulation

11. Complete Characterization of Broadcast and Pseudo-signatures from Correlations

12. Private Index Coding

13. Private Two-Terminal Hypothesis Testing

14. Secure Computation to Hide Functions of Inputs

15. Coordination Through Shared Randomness

16. Byzantine Multiple Access

17. Optimal Communication Rates and Combinatorial Properties for Common Randomness Generation

18. Interactive Secure Function Computation

20. Secure Non-interactive Reduction and Spectral Analysis of Correlations

21. Joint State Estimation and Communication over a State-Dependent Gaussian Multiple Access Channel

22. Arbitrarily Varying Remote Sources

23. Coordination Using Individually Shared Randomness

24. Secure Computation of Randomized Functions: Further Results

25. Coding for Arbitrarily Varying Remote Sources

26. Zero-Communication Reductions

27. Wiretapped Oblivious Transfer

28. Communication and Randomness Lower Bounds for Secure Computation

30. R\'enyi Information Complexity and an Information Theoretic Characterization of the Partition Bound

31. Communication in the Presence of a State-Aware Adversary

32. On the Oblivious Transfer Capacity of the Degraded Wiretapped Binary Erasure Channel

33. Dirty Paper Arbitrarily Varying Channel with a State-Aware Adversary

34. Private Data Transfer over a Broadcast Channel

35. On the Noisy Feedback Capacity of Gaussian Broadcast Channels

36. Critical Database Size for Effective Caching

37. Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation

38. Tension Bounds for Information Complexity

39. Secret Communication over Broadcast Erasure Channels with State-feedback

40. How to Securely Compute the Modulo-Two Sum of Binary Sources

41. A New Upperbound for the Oblivious Transfer Capacity of Discrete Memoryless Channels

42. The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel

43. Writing on a Dirty Paper in the presence of Jamming

44. Correlated Jamming in a Joint Source Channel Communication System

45. Is Non-Unique Decoding Necessary?

46. On the Communication Complexity of Secure Computation

47. Estimation of Bandlimited Signals in Additive Gaussian Noise: a 'Precision Indifference' Principle

48. Assisted Common Information with an Application to Secure Two-Party Sampling

49. Secure Capacity Region for Erasure Broadcast Channels with Feedback

50. Assisted Common Information: Further Results

Catalog

Books, media, physical & digital resources