default search action
K. Srinathan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c96]Praguna Manvi, Achintya M. Desai, Kannan Srinathan, Anoop M. Namboodiri:
S-BAN: Secure Biometric Authentication using Noise. ICVGIP 2023: 7:1-7:9 - [c95]Shubham Raj, Snehil Joshi, Kannan Srinathan:
PIUDI: Private Information Update for Distributed Infrastructure. SECRYPT 2023: 425-432 - 2022
- [c94]Praguna Manvi, Achintya Desai, Kannan Srinathan, Anoop M. Namboodiri:
SIAN: Secure Iris Authentication using Noise. IJCB 2022: 1-9 - [i17]Anurag Jain, Sujit Gujar, Kannan Srinathan:
Interlude: Balancing Chaos And Harmony For Fair and Fast Blockchains. CoRR abs/2209.10125 (2022) - 2021
- [c93]Snehil Joshi, Durgesh Pandey, Kannan Srinathan:
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability. ICISC 2021: 71-91 - 2020
- [i16]Achintya Desai, Shubham Raj, Kannan Srinathan:
Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary. IACR Cryptol. ePrint Arch. 2020: 1337 (2020)
2010 – 2019
- 2019
- [j16]Saurav Malani, Jangirala Srinivas, Ashok Kumar Das, Kannan Srinathan, Minho Jo:
Certificate-Based Anonymous Device Access Control Scheme for IoT Environment. IEEE Internet Things J. 6(6): 9762-9773 (2019) - [c92]Ravi Kishore, Anupriya Inumella, Kannan Srinathan:
Perfectly secure message transmission over partially synchronous networks. ICDCN 2019: 302-306 - 2018
- [j15]Ravi Kishore, Chiranjeevi Vanarasa, Kannan Srinathan:
On minimal connectivity requirements for secure message transmission in directed networks. Inf. Process. Lett. 131: 1-6 (2018) - [j14]Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan:
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission. IEEE Trans. Inf. Theory 64(2): 1404-1422 (2018) - [i15]Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan:
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission. IACR Cryptol. ePrint Arch. 2018: 1167 (2018) - 2017
- [c91]Mallipeddi Hardhik, Dip Sankar Banerjee, Kiran Raj Ramamoorthy, Kishore Kothapalli, Kannan Srinathan:
Nearly Balanced Work Partitioning for Heterogeneous Algorithms. ICPP 2017: 50-59 - 2016
- [j13]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
A graph-based unsupervised N-gram filtration technique for automatic keyphrase extraction. Int. J. Data Min. Model. Manag. 8(2): 124-143 (2016) - [j12]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
Unsupervised deep semantic and logical analysis for identification of solution posts from community answers. Int. J. Inf. Decis. Sci. 8(2): 153-178 (2016) - [c90]Ravi Kishore, Chiranjeevi Vanarasa, Tushant Jha, Kannan Srinathan:
On perfectly secret message transmission in digraphs tolerating dual failures. ICDCN 2016: 29:1-29:10 - [c89]Lokesh Jain, Aditya Chandran, Sanjay Rawat, Kannan Srinathan:
Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach. ICISS 2016: 532-542 - [c88]Mahabir Prasad Jhanwar, Kannan Srinathan:
Secret Sharing for mNP: Completeness Results. INDOCRYPT 2016: 380-390 - [c87]Aditya Chandran, Lokesh Jain, Sanjay Rawat, Kannan Srinathan:
Discovering Vulnerable Functions: A Code Similarity Based Approach. SSCC 2016: 390-402 - 2015
- [j11]Ananda Swarup Das, Prosenjit Gupta, Kishore Kothapalli, Kannan Srinathan:
Reporting and counting maximal points in a query orthogonal rectangle. J. Discrete Algorithms 30: 78-95 (2015) - [j10]Sk Sazim, Chiranjeevi Vanarasa, Indranil Chakrabarty, K. Srinathan:
Retrieving and routing quantum information in a quantum network. Quantum Inf. Process. 14(12): 4651-4664 (2015) - [c86]Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan:
Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity. ICITS 2015: 33-50 - [c85]Kiran Raj Ramamoorthy, Dip Sankar Banerjee, Kannan Srinathan, Kishore Kothapalli:
A Novel Heterogeneous Algorithm for Multiplying Scale-Free Sparse Matrices. IPDPS Workshops 2015: 637-646 - 2014
- [j9]Ananda Swarup Das, Prosenjit Gupta, Kishore Kothapalli, Kannan Srinathan:
On reporting the L1 metric closest pair in a query rectangle. Inf. Process. Lett. 114(5): 256-263 (2014) - [c84]Sankalp Khare, Jatin Agarwal, Nadeem Moidu, Kannan Srinathan:
Improved Bounds for Smallest Enclosing Disk Range Queries. CCCG 2014 - [c83]M. R. Rajeevalochana, Kannan Srinathan:
Choosing and Working of an Anonymous Leader. ICAA 2014: 101-109 - [c82]Nadeem Moidu, Jatin Agarwal, Sankalp Khare, Kishore Kothapalli, Kannan Srinathan:
On Generalized Planar Skyline and Convex Hull Range Queries. WALCOM 2014: 34-43 - 2013
- [j8]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission. Theor. Comput. Sci. 496: 2-16 (2013) - [c81]Dharmeet Singh Hora, Piyush Bansal, Kishore Kothapalli, Kannan Srinathan:
Allowing Multiple Rounds in the Shared Whiteboard Model: Some More Impossibility Results. ADCONS 2013: 142-147 - [c80]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
A Knowledge Induced Graph-Theoretical Model for Extract and Abstract Single Document Summarization. CICLing (2) 2013: 408-423 - [c79]Ananda Swarup Das, Prosenjit Gupta, Kannan Srinathan:
Counting Maximal Points in a Query Orthogonal Rectangle. WALCOM 2013: 65-76 - [i14]Jatin Agarwal, Nadeem Moidu, Kishore Kothapalli, Kannan Srinathan:
Efficient Range Reporting of Convex Hull. CoRR abs/1307.5612 (2013) - 2012
- [j7]Ashwinkumar Badanidiyuru, Arpita Patra, Ashish Choudhury, Kannan Srinathan, C. Pandu Rangan:
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission. J. ACM 59(5): 22:1-22:35 (2012) - [c78]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
Using Graph Based Mapping of Co-occurring Words and Closeness Centrality Score for Summarization Evaluation. CICLing (2) 2012: 353-365 - [c77]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
Using Wikipedia Anchor Text and Weighted Clustering Coefficient to Enhance the Traditional Multi-document Summarization. CICLing (2) 2012: 390-401 - [c76]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission. ICDCN 2012: 138-152 - [c75]Rohit Ashok Khot, Ponnurangam Kumaraguru, Kannan Srinathan:
WYSWYE: shoulder surfing defense for recognition based graphical passwords. OZCHI 2012: 285-294 - [c74]Ananda Swarup Das, Prosenjit Gupta, Anil Kishore Kalavagattu, Jatin Agarwal, Kannan Srinathan, Kishore Kothapalli:
Range Aggregate Maximal Points in the Plane. WALCOM 2012: 52-63 - [i13]Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan:
A New Look at Composition of Authenticated Byzantine Generals. CoRR abs/1203.1463 (2012) - 2011
- [j6]Ananda Swarup Das, Prosenjit Gupta, Kannan Srinathan:
Data Structures for Extension Violations in a Query Range. J. Math. Model. Algorithms 10(1): 79-107 (2011) - [j5]Ashish Choudhury, Arpita Patra, B. V. Ashwinkumar, Kannan Srinathan, C. Pandu Rangan:
Secure message transmission in asynchronous networks. J. Parallel Distributed Comput. 71(8): 1067-1074 (2011) - [c73]Shashank Lagishetty, Pruthvi Reddy Sabbu, Kannan Srinathan:
DMIPS - Defensive Mechanism against IP Spoofing. ACISP 2011: 276-291 - [c72]Pruthvi Reddy Sabbu, Ganugula Umadevi, Kannan Srinathan, Bezawada Bruhadeshwar:
An Oblivious Image Retrieval Protocol. AINA Workshops 2011: 349-354 - [c71]Ananda Swarup Das, Prosenjit Gupta, Kannan Srinathan:
Detecting VLSI Layout, Connectivity Errors in a Query Window. CCCG 2011 - [c70]Ananda Swarup Das, Prosenjit Gupta, Kannan Srinathan, Kishore Kothapalli:
Finding Maximum Density Axes Parallel Regions for Weighted Point Sets. CCCG 2011 - [c69]Anil Kishore Kalavagattu, Ananda Swarup Das, Kishore Kothapalli, Kannan Srinathan:
On Finding Skyline Points for Range Queries in Plane. CCCG 2011 - [c68]Rohit Ashok Khot, Kannan Srinathan, Ponnurangam Kumaraguru:
MARASIM: a novel jigsaw based authentication scheme using tagging. CHI 2011: 2605-2614 - [c67]Madhuchand Rushi Pillutla, Nisarg Raval, Piyush Bansal, Kannan Srinathan, C. V. Jawahar:
LSH based outlier detection and its application in distributed setting. CIKM 2011: 2289-2292 - [c66]Nisarg Raval, Madhuchand Rushi Pillutla, Piyush Bansal, Kannan Srinathan, C. V. Jawahar:
Privacy Preserving Outlier Detection Using Locality Sensitive Hashing. ICDM Workshops 2011: 674-681 - [c65]Manan Nayak, Shashank Agrawal, Kannan Srinathan:
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks. ICITS 2011: 32-51 - [c64]Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission in Asynchronous Directed Graphs. INDOCRYPT 2011: 359-378 - [c63]Rohit Ashok Khot, Kannan Srinathan, Rutuja Ashok Khot:
NAPTune: fine tuning graphical authentication. IndiaHCI 2011: 47-56 - [c62]Saladi Rahul, Ananda Swarup Das, Krishnan Sundara Rajan, Kannan Srinathan:
Range-Aggregate Queries Involving Geometric Aggregation Operations. WALCOM 2011: 122-133 - [c61]Piyush Bansal, Prasant Gopal, Anuj Gupta, Kannan Srinathan, Pranav K. Vasishta:
Byzantine Agreement Using Partial Authentication. DISC 2011: 389-403 - [i12]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
Using Unsupervised System with least linguistic features for TAC-AESOP Task. TAC 2011 - [i11]Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission In Asynchronous Directed Networks. IACR Cryptol. ePrint Arch. 2011: 13 (2011) - [i10]Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Unconditionally Reliable Message Transmission in Directed Neighbour Networks. IACR Cryptol. ePrint Arch. 2011: 14 (2011) - [i9]Manan Nayak, Shashank Agrawal, Kannan Srinathan:
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks. IACR Cryptol. ePrint Arch. 2011: 320 (2011) - 2010
- [j4]Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan:
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality. Int. J. Appl. Cryptogr. 2(2): 159-197 (2010) - [j3]Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, C. V. Jawahar:
Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans. Inf. Forensics Secur. 5(2): 255-268 (2010) - [c60]Rohit Ashok Khot, Kannan Srinathan:
PhotoSense: emergent semantics based approach to image annotation. CHI Extended Abstracts 2010: 3301-3306 - [c59]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
Evaluating Information Coverage in Machine Generated Summary and Variable Length Documents. COMAD 2010: 163 - [c58]Niraj Kumar, Venkata Vinay Babu Vemula, Kannan Srinathan, Vasudeva Varma:
Exploiting N-gram Importance and Wikipedia based Additional Knowledge for Improvements in GAAC based Document Clustering. KDIR 2010: 182-187 - [c57]Anuj Gupta, Sandeep Hans, Kannan Srinathan, C. Pandu Rangan:
On Composability of Reliable Unicast and Broadcast. ICDCN 2010: 54-66 - [c56]Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan:
Authenticated Byzantine Generals in Dual Failure Model. ICDCN 2010: 79-91 - [c55]Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, C. V. Jawahar:
Efficient Privacy Preserving K-Means Clustering. PAISI 2010: 154-166 - [c54]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT. DISC 2010: 201-203 - [i8]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
An Effective Approach for AESOP and Guided Summarization Task. TAC 2010 - [i7]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission. IACR Cryptol. ePrint Arch. 2010: 392 (2010)
2000 – 2009
- 2009
- [j2]Arpita Patra, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan, Prasad Raghavendra:
Perfectly reliable and secure message transmission tolerating mobile adversary. Int. J. Appl. Cryptogr. 1(3): 200-224 (2009) - [c53]Sandeep Hans, Sarat C. Addepalli, Anuj Gupta, Kannan Srinathan:
On Privacy Preserving Convex Hull. ARES 2009: 187-192 - [c52]Ganugula Umadevi, Sarat C. Addepalli, Kannan Srinathan:
Generalized Robust Combiners for Oblivious Transfer. ARES 2009: 510-515 - [c51]Sarat C. Addepalli, Piyush Bansal, Kannan Srinathan, K. Madhava Krishna:
Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots. ARES 2009: 600-605 - [c50]Rahul Sawhney, K. Madhava Krishna, Kannan Srinathan:
On fast exploration in 2D and 3D terrains with multiple robots. AAMAS (1) 2009: 73-80 - [c49]Ananda Swarup Das, Prosenjit Gupta, Kannan Srinathan:
Data Structures for Reporting Extension Violations in a Query Range. CCCG 2009: 129-132 - [c48]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. AsiaCCS 2009: 171-182 - [c47]Kishore Kothapalli, Rishabh Mukherjee, M. Suhail Rehman, Suryakant Patidar, P. J. Narayanan, Kannan Srinathan:
A performance prediction model for the CUDA GPGPU platform. HiPC 2009: 463-472 - [c46]Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan, C. V. Jawahar:
Efficient Biometric Verification in Encrypted Domain. ICB 2009: 899-908 - [c45]Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, C. V. Jawahar:
Efficient privacy preserving video surveillance. ICCV 2009: 1639-1646 - [c44]Ashish Choudhary, Arpita Patra, B. V. Ashwinkumar, Kannan Srinathan, C. Pandu Rangan:
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks. ICDCN 2009: 148-162 - [c43]Nagaraja Kaushik Gampa, Rohit Ashok Khot, Kannan Srinathan:
Let Only the Right One IN: Privacy Management Scheme for Social Network. ICISS 2009: 310-317 - [c42]Prasant Gopal, Anuj Gupta, Pranav K. Vasishta, Piyush Bansal, Kannan Srinathan:
Brief announcement: global consistency can be easier than point-to-point communication. PODC 2009: 310-311 - [c41]Pranav K. Vasishta, Prasant Gopal, Anuj Gupta, Piyush Bansal, K. Srinathan:
Brief announcement: topology knowledge affects probabilistic reliable communication. PODC 2009: 314-315 - 2008
- [c40]Ananda Swarup Das, Jitu Kumar Keshri, Kannan Srinathan, Vaibhav Srivastava:
Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles. ARES 2008: 446-451 - [c39]Rahul Sawhney, K. Madhava Krishna, Kannan Srinathan, Mahesh Mohan:
On reduced time fault tolerant paths for multiple UAVs covering a hostile terrain. AAMAS (3) 2008: 1171-1174 - [c38]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Reliable Message Transmission in Directed Hypergraphs. CANS 2008: 285-303 - [c37]Jagarlamudi Shashank, Palivela Kowshik, Kannan Srinathan, C. V. Jawahar:
Private Content Based Image Retrieval. CVPR 2008 - [c36]Niraj Kumar, Kannan Srinathan:
Automatic keyphrase extraction from scientific documents using N-gram filtration technique. ACM Symposium on Document Engineering 2008: 199-208 - [c35]Bhavani Shankar, Kannan Srinathan, C. Pandu Rangan:
Alternative Protocols for Generalized Oblivious Transfer. ICDCN 2008: 304-309 - [c34]Chigullapally Narsimha Raju, Ganugula Umadevi, Kannan Srinathan, C. V. Jawahar:
A novel video encryption technique based on secret sharing. ICIP 2008: 3136-3139 - [c33]Ashish Choudhary, Arpita Patra, B. V. Ashwinkumar, K. Srinathan, C. Pandu Rangan:
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary. ICITS 2008: 137-155 - [c32]Chigullapally Narsimha Raju, Ganugula Umadevi, Kannan Srinathan, C. V. Jawahar:
Fast and Secure Real-Time Video Encryption. ICVGIP 2008: 257-264 - [c31]Mahesh Mohan, Rahul Sawhney, K. Madhava Krishna, K. Srinathan, Manohar B. Srikanth:
Covering hostile terrains with partial and complete visibilities: On minimum distance paths. IROS 2008: 2572-2577 - [c30]B. V. Ashwinkumar, Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan:
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary. PODC 2008: 115-124 - [c29]Kannan Srinathan, Ashish Choudhary, Arpita Patra, C. Pandu Rangan:
Efficient single phase unconditionally secure message transmission with optimum communication complexity. PODC 2008: 457 - [c28]Bhavani Shankar, Prasant Gopal, Kannan Srinathan, C. Pandu Rangan:
Unconditionally reliable message transmission in directed networks. SODA 2008: 1048-1055 - [i6]Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan:
Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality. IACR Cryptol. ePrint Arch. 2008: 141 (2008) - [i5]Arpita Patra, Ashish Choudhury, B. V. Ashwinkumar, Kannan Srinathan, C. Pandu Rangan:
Perfectly Secure Message Transmission Tolerating Mixed Adversary. IACR Cryptol. ePrint Arch. 2008: 232 (2008) - [i4]Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan:
Authenticated Byzantine Generals in Dual Failure Model. IACR Cryptol. ePrint Arch. 2008: 287 (2008) - [i3]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Reliable Message Transmission in Directed Hypergraphs. IACR Cryptol. ePrint Arch. 2008: 371 (2008) - [i2]Pranav K. Vasishta, Anuj Gupta, Prasant Gopal, Piyush Bansal, Rishabh Mukherjee, M. Poornima, Kannan Srinathan, Kishore Kothapalli:
How Far Must You See To Hear Reliably. IACR Cryptol. ePrint Arch. 2008: 393 (2008) - [i1]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary. IACR Cryptol. ePrint Arch. 2008: 506 (2008) - 2007
- [c27]Kannan Srinathan, Prasad Raghavendra, C. Pandu Rangan:
On Proactive Perfectly Secure Message Transmission. ACISP 2007: 461-473 - [c26]Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan:
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. CANS 2007: 80-101 - [c25]Rohit Ashok Khot, Ravikant Poola, Kishore Kothapalli, Kannan Srinathan:
Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Networks. ICDCIT 2007: 54-66 - [c24]K. Srinathan, C. Pandu Rangan, Ranjit Kumaresan:
On Exponential Lower Bound for Protocols for Reliable Communication in Networks. ICITS 2007: 89-98 - [c23]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. INDOCRYPT 2007: 101-122 - [c22]Ananda Swarup Das, Kannan Srinathan, Ritesh Kumar Tiwari, Vaibhav Srivastava:
Privacy Preserving Computation of Shortest Path in Presence of a Single Convex Polygonal Obstacle. MDM 2007: 248-252 - [c21]Kannan Srinathan, N. R. Prasad, C. Pandu Rangan:
On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication. S&P 2007: 311-320 - [c20]Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan:
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary. DISC 2007: 496-498 - [e1]K. Srinathan, C. Pandu Rangan, Moti Yung:
Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings. Lecture Notes in Computer Science 4859, Springer 2007, ISBN 978-3-540-77025-1 [contents] - 2006
- [j1]Arvind Narayanan, K. Srinathan, C. Pandu Rangan:
Perfectly Reliable Message Transmission. Inf. Process. Lett. 100(1): 23-28 (2006) - [c19]Arpita Patra, Ashish Choudhary, K. Srinathan, C. Pandu Rangan:
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission. INDOCRYPT 2006: 221-235 - [c18]Kannan Srinathan, C. Pandu Rangan:
Possibility and complexity of probabilistic reliable communication in directed networks. PODC 2006: 265-274 - [c17]Matthias Fitzi, Juan A. Garay, Shyamnath Gollakota, C. Pandu Rangan, K. Srinathan:
Round-Optimal and Efficient Verifiable Secret Sharing. TCC 2006: 329-342 - 2004
- [c16]K. Srinathan, Arvind Narayanan, C. Pandu Rangan:
Optimal Perfectly Secure Message Transmission. CRYPTO 2004: 545-561 - [c15]D. V. S. Ravikant, Muthuramakrishnan Venkitasubramaniam, V. Srikanth, K. Srinathan, C. Pandu Rangan:
Brief announcement: on the round complexity of distributed consensus over synchronous networks. PODC 2004: 397 - [c14]D. V. S. Ravikant, Muthuramakrishnan Venkitasubramaniam, V. Srikanth, K. Srinathan, C. Pandu Rangan:
On Byzantine Agreement over (2, 3)-Uniform Hypergraphs. DISC 2004: 450-464 - 2003
- [c13]Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim:
On the Power of Computational Secret Sharing. INDOCRYPT 2003: 162-176 - [c12]S. Amitanand, I. Sanketh, K. Srinathan, Vinod Vaikuntanathan, C. Pandu Rangan:
Distributed consensus in the presence of sectional faults. PODC 2003: 202-210 - [c11]K. Srinathan, Vinod Vaikuntanathan, C. Pandu Rangan:
Brief announcement: efficient perfectly secure communication over synchronous networks. PODC 2003: 252 - 2002
- [c10]M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan:
Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. ACISP 2002: 497-512 - [c9]K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan:
Asynchronous Secure Communication Tolerating Mixed Adversaries. ASIACRYPT 2002: 224-242 - [c8]K. Srinathan, Pranava R. Goundan, M. V. N. Ashwin Kumar, R. Nandakumar, C. Pandu Rangan:
Theory of Equal-Flows in Networks. COCOON 2002: 514-524 - [c7]B. Prabhu, K. Srinathan, C. Pandu Rangan:
Asynchronous Unconditionally Secure Computation: An Efficiency Improvement. INDOCRYPT 2002: 93-107 - [c6]K. Srinathan, N. Tharani Rajan, C. Pandu Rangan:
Non-perfect Secret Sharing over General Access Structures. INDOCRYPT 2002: 409-421 - [c5]M. V. N. Ashwin Kumar, Pranava R. Goundan, K. Srinathan, C. Pandu Rangan:
On perfectly secure cmmunication over arbitrary networks. PODC 2002: 193-202 - [c4]B. Prabhu, K. Srinathan, C. Pandu Rangan:
Trading Players for Efficiency in Unconditional Multiparty Computation. SCN 2002: 342-353 - 2001
- [c3]K. Srinathan, C. Pandu Rangan, V. Kamakoti:
Toward Optimal Player Weights in Secure Distributed Protocols. INDOCRYPT 2001: 232-241 - 2000
- [c2]K. Srinathan, C. Pandu Rangan:
Efficient Asynchronous Secure Multiparty Distributed Computation. INDOCRYPT 2000: 117-129 - [c1]K. Srinathan, C. Pandu Rangan:
Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation. INDOCRYPT 2000: 130-142
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint