319,465 results on '"Pandu Rangan, C."'
Search Results
2. A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
3. An Efficient Non-transferable Proxy Re-encryption Scheme
4. Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting
5. A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
6. Certificateless and Identity based Authenticated Key Exchange Protocols
7. Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
8. Efficient single round attribute-based authenticated key exchange protocol
9. Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting
10. Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round
11. A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions
12. An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
13. Cache Me If You Can: Capacitated Selfish Replication Games
14. Optimal Parameters for Efficient Two-Party Computation Protocols
15. Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
16. Identity-Based Deterministic Signature Scheme without Forking-Lemma
17. Rational Secret Sharing with Honest Players over an Asynchronous Channel
18. A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs
19. Conditional Proxy Re-Encryption - A More Efficient Construction
20. Identity Based Public Verifiable Signcryption Scheme
21. On the Security of Identity Based Ring Signcryption Schemes
22. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
23. An Efficient Non-transferable Proxy Re-encryption Scheme
24. Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases
25. Skew Heaps
26. Randomized Dictionary Structures
27. Trading Players for Efficiency in Unconditional Multiparty Computation
28. Efficient Asynchronous Secure Multiparty Distributed Computation
29. Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation
30. Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
31. The Colored Sector Search Tree: A Dynamic Data Structure for Efficient High Dimensional Nearest-Foreign-Neighbor Queries
32. An Efficient Distributed Algorithm For st-numbering The Vertices Of A Biconnected Graph
33. Weighted irredundance of interval graphs
34. Edge-disjoint paths in permutation graphs
35. Weighted independent perfect domination on cocomparability graphs
36. Certificateless and Identity based Authenticated Key Exchange Protocols
37. Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round
38. Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
39. An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
40. Optimal Parameters for Efficient Two-Party Computation Protocols
41. Cache Me If You Can: Capacitated Selfish Replication Games
42. A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions
43. Identity-Based Deterministic Signature Scheme without Forking-Lemma
44. A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs
45. Identity Based Public Verifiable Signcryption Scheme
46. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
47. Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases
48. Conditional Proxy Re-Encryption - A More Efficient Construction
49. Rational Secret Sharing with Honest Players over an Asynchronous Channel
50. Trading Players for Efficiency in Unconditional Multiparty Computation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.