Search

Your search keyword '"Rangan, C. Pandu"' showing total 11,937 results

Search Constraints

Start Over You searched for: Author "Rangan, C. Pandu" Remove constraint Author: "Rangan, C. Pandu"
11,937 results on '"Rangan, C. Pandu"'

Search Results

1. Forward Security Under Leakage Resilience, Revisited

2. Reoptimization of Path Vertex Cover Problem

6. Two-Stage Framework for Accurate and Differentially Private Network Information Publication

7. Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts

8. Stable Marriage Problem with Ties and Incomplete bounded length preference list under social stability

9. A Closer Look at Anonymous Proxy Re-Encryption Schemes

10. Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks

13. Identity-Based Group Encryption Revisited

14. Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security

15. On the Fault Tolerance and Hamiltonicity of the Optical Transpose Interconnection System of Non-Hamiltonian Base Graphs

16. Cache Me If You Can: Capacitated Selfish Replication Games in Networks

17. Communication and Round Efficient Information Checking Protocol

22. Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE

25. Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction

28. A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory

29. Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme

30. Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality

33. Threshold Discernible Ring Signatures

34. Compact Stateful Encryption Schemes with Ciphertext Verifiability

35. ID Based Signcryption Scheme in Standard Model

36. Identity Based Online/Offline Encryption and Signcryption Schemes Revisited

37. Attribute Based Signatures for Bounded Multi-level Threshold Circuits

38. Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience

40. The Round Complexity of Verifiable Secret Sharing: The Statistical Case

41. Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience

42. Sanitizable Signatures with Strong Transparency in the Standard Model

43. Breaking and Building of Threshold Signcryption Schemes

44. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing

45. Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding

46. Communication Optimal Multi-valued Asynchronous Broadcast Protocol

47. Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience

48. Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles

49. Certificateless KEM and Hybrid Signcryption Schemes Revisited

50. Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience

Catalog

Books, media, physical & digital resources