11,930 results on '"Rangan, C. Pandu"'
Search Results
2. Forward Security Under Leakage Resilience, Revisited
3. Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts
4. Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks
5. Sharing of Encrypted Files in Blockchain Made Simpler
6. Two-Stage Framework for Accurate and Differentially Private Network Information Publication
7. A Closer Look at Anonymous Proxy Re-Encryption Schemes
8. Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks
9. Reoptimization of Path Vertex Cover Problem
10. Identity-Based Group Encryption Revisited
11. Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE
12. Stable Marriage Problem with Ties and Incomplete bounded length preference list under social stability
13. Sharing of Encrypted Files in Blockchain Made Simpler
14. Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks
15. Two-Stage Framework for Accurate and Differentially Private Network Information Publication
16. Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts
17. Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction
18. Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters
19. A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
20. Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
21. Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
22. Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption + schemes
23. A Closer Look at Anonymous Proxy Re-Encryption Schemes
24. Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks
25. Improving Accuracy of Differentially Private Kronecker Social Networks via Graph Clustering
26. Provably secure lattice based identity based unidirectional PRE and PRE+ schemes
27. Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security
28. On the Fault Tolerance and Hamiltonicity of the Optical Transpose Interconnection System of Non-Hamiltonian Base Graphs
29. Compact Stateful Encryption Schemes with Ciphertext Verifiability
30. ID Based Signcryption Scheme in Standard Model
31. Threshold Discernible Ring Signatures
32. Cryptographic Approaches to Denial-of-Service Resistance
33. Attribute Based Signatures for Bounded Multi-level Threshold Circuits
34. Identity Based Online/Offline Encryption and Signcryption Schemes Revisited
35. Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience
36. Cache Me If You Can: Capacitated Selfish Replication Games in Networks
37. Communication and Round Efficient Information Checking Protocol
38. The Round Complexity of Verifiable Secret Sharing: The Statistical Case
39. On Communication Complexity of Secure Message Transmission in Directed Networks
40. Variants of Spreading Messages
41. Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
42. Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding
43. Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
44. Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
45. Communication Optimal Multi-valued Asynchronous Broadcast Protocol
46. Sanitizable Signatures with Strong Transparency in the Standard Model
47. Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience
48. On Composability of Reliable Unicast and Broadcast
49. Pathwidth and Searching in Parameterized Threshold Graphs
50. Breaking and Building of Threshold Signcryption Schemes
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.