11,937 results on '"Rangan, C. Pandu"'
Search Results
2. Reoptimization of Path Vertex Cover Problem
3. Forward Security Under Leakage Resilience, Revisited
4. Sharing of Encrypted Files in Blockchain Made Simpler
5. Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks
6. Two-Stage Framework for Accurate and Differentially Private Network Information Publication
7. Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts
8. Stable Marriage Problem with Ties and Incomplete bounded length preference list under social stability
9. A Closer Look at Anonymous Proxy Re-Encryption Schemes
10. Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks
11. Provably secure lattice based identity based unidirectional PRE and PRE[formula omitted] schemes
12. Cache Me if You Can: Capacitated Selfish Replication Games in Networks
13. Identity-Based Group Encryption Revisited
14. Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security
15. On the Fault Tolerance and Hamiltonicity of the Optical Transpose Interconnection System of Non-Hamiltonian Base Graphs
16. Cache Me If You Can: Capacitated Selfish Replication Games in Networks
17. Communication and Round Efficient Information Checking Protocol
18. Two-Stage Framework for Accurate and Differentially Private Network Information Publication
19. Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts
20. Sharing of Encrypted Files in Blockchain Made Simpler
21. Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks
22. Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE
23. A Closer Look at Anonymous Proxy Re-Encryption Schemes
24. Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks
25. Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction
26. Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
27. Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters
28. A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
29. Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
30. Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality
31. Identity-Based Group Encryption Revisited
32. Toward Optimal Player Weights in Secure Distributed Protocols
33. Threshold Discernible Ring Signatures
34. Compact Stateful Encryption Schemes with Ciphertext Verifiability
35. ID Based Signcryption Scheme in Standard Model
36. Identity Based Online/Offline Encryption and Signcryption Schemes Revisited
37. Attribute Based Signatures for Bounded Multi-level Threshold Circuits
38. Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience
39. Cryptographic Approaches to Denial-of-Service Resistance
40. The Round Complexity of Verifiable Secret Sharing: The Statistical Case
41. Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience
42. Sanitizable Signatures with Strong Transparency in the Standard Model
43. Breaking and Building of Threshold Signcryption Schemes
44. Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
45. Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding
46. Communication Optimal Multi-valued Asynchronous Broadcast Protocol
47. Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
48. Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
49. Certificateless KEM and Hybrid Signcryption Schemes Revisited
50. Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.