Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Subhash C. Kak
@article{DBLP:journals/cssp/Kak24, author = {Subhash C. Kak}, title = {Fractal Dimensions in Circular and Spiral Phenomena}, journal = {Circuits Syst. Signal Process.}, volume = {43}, number = {1}, pages = {634--645}, year = {2024}, url = {https://doi.org/10.1007/s00034-023-02482-4}, doi = {10.1007/S00034-023-02482-4}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cssp/Kak24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaic/Kak23, author = {Subhash C. Kak}, title = {An Information Principle Based on Partitions for Cognitive Data}, journal = {J. Artif. Intell. Conscious.}, volume = {10}, number = {1}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.1142/S2705078522500138}, doi = {10.1142/S2705078522500138}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaic/Kak23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaic/Kak23a, author = {Subhash C. Kak}, title = {No-Go Theorems on Machine Consciousness}, journal = {J. Artif. Intell. Conscious.}, volume = {10}, number = {2}, pages = {237--247}, year = {2023}, url = {https://doi.org/10.1142/s2705078523500029}, doi = {10.1142/S2705078523500029}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaic/Kak23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppl/Kak23, author = {Subhash C. Kak}, title = {Linear Fractals with Weights}, journal = {Parallel Process. Lett.}, volume = {33}, number = {4}, pages = {2340011:1--2340011:14}, year = {2023}, url = {https://doi.org/10.1142/S012962642340011X}, doi = {10.1142/S012962642340011X}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppl/Kak23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppl/Kak23a, author = {Subhash C. Kak}, title = {The Dimensionality of Genetic Information}, journal = {Parallel Process. Lett.}, volume = {33}, number = {4}, pages = {2340012:1--2340012:11}, year = {2023}, url = {https://doi.org/10.1142/S0129626423400121}, doi = {10.1142/S0129626423400121}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppl/Kak23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tib/Kak23, author = {Subhash C. Kak}, title = {Self-similarity and the maximum entropy principle in the genetic code}, journal = {Theory Biosci.}, volume = {142}, number = {3}, pages = {205--210}, year = {2023}, url = {https://doi.org/10.1007/s12064-023-00396-y}, doi = {10.1007/S12064-023-00396-Y}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tib/Kak23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssp/Kak22, author = {Subhash C. Kak}, title = {New Classes of Regular Symmetric Fractals}, journal = {Circuits Syst. Signal Process.}, volume = {41}, number = {7}, pages = {4149--4159}, year = {2022}, url = {https://doi.org/10.1007/s00034-022-01966-z}, doi = {10.1007/S00034-022-01966-Z}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cssp/Kak22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaic/Kak22, author = {Subhash C. Kak}, title = {The Limits to Machine Consciousness}, journal = {J. Artif. Intell. Conscious.}, volume = {9}, number = {1}, pages = {59--72}, year = {2022}, url = {https://doi.org/10.1142/s2705078521500193}, doi = {10.1142/S2705078521500193}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaic/Kak22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaic/Kak22a, author = {Subhash C. Kak}, title = {Number of Autonomous Cognitive Agents in a Neural Network}, journal = {J. Artif. Intell. Conscious.}, volume = {9}, number = {2}, pages = {227--240}, year = {2022}, url = {https://doi.org/10.1142/s2705078522500023}, doi = {10.1142/S2705078522500023}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaic/Kak22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssp/Kak21, author = {Subhash C. Kak}, title = {The Base-e Representation of Numbers and the Power Law}, journal = {Circuits Syst. Signal Process.}, volume = {40}, number = {1}, pages = {490--500}, year = {2021}, url = {https://doi.org/10.1007/s00034-020-01480-0}, doi = {10.1007/S00034-020-01480-0}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cssp/Kak21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssp/Kak21a, author = {Subhash C. Kak}, title = {The Intrinsic Dimensionality of Data}, journal = {Circuits Syst. Signal Process.}, volume = {40}, number = {5}, pages = {2599--2607}, year = {2021}, url = {https://doi.org/10.1007/s00034-020-01583-8}, doi = {10.1007/S00034-020-01583-8}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cssp/Kak21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssp/Kak21b, author = {Subhash C. Kak}, title = {Fractals with Optimal Information Dimension}, journal = {Circuits Syst. Signal Process.}, volume = {40}, number = {11}, pages = {5733--5743}, year = {2021}, url = {https://doi.org/10.1007/s00034-021-01726-5}, doi = {10.1007/S00034-021-01726-5}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cssp/Kak21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-04093, author = {Subhash C. Kak}, title = {Reasoning in a Hierarchical System with Missing Group Size Information}, journal = {CoRR}, volume = {abs/1802.04093}, year = {2018}, url = {http://arxiv.org/abs/1802.04093}, eprinttype = {arXiv}, eprint = {1802.04093}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-04093.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-04994, author = {Subhash C. Kak}, title = {On the Algebra in Boole's Laws of Thought}, journal = {CoRR}, volume = {abs/1803.04994}, year = {2018}, url = {http://arxiv.org/abs/1803.04994}, eprinttype = {arXiv}, eprint = {1803.04994}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-04994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-02759, author = {Subhash C. Kak}, title = {Order Effects for Queries in Intelligent Systems}, journal = {CoRR}, volume = {abs/1804.02759}, year = {2018}, url = {http://arxiv.org/abs/1804.02759}, eprinttype = {arXiv}, eprint = {1804.02759}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-02759.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-06419, author = {Subhash C. Kak}, title = {On Ternary Coding and Three-Valued Logic}, journal = {CoRR}, volume = {abs/1807.06419}, year = {2018}, url = {http://arxiv.org/abs/1807.06419}, eprinttype = {arXiv}, eprint = {1807.06419}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-06419.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Kak17, author = {Subhash C. Kak}, title = {Power series models of self-similarity in social networks}, journal = {Inf. Sci.}, volume = {376}, pages = {31--38}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.10.010}, doi = {10.1016/J.INS.2016.10.010}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Kak17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acssc/BusireddygariK17, author = {Prashanth Busireddygari and Subhash C. Kak}, editor = {Michael B. Matthews}, title = {Authentication of parties in piggy bank cryptography}, booktitle = {51st Asilomar Conference on Signals, Systems, and Computers, {ACSSC} 2017, Pacific Grove, CA, USA, October 29 - November 1, 2017}, pages = {1389--1393}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ACSSC.2017.8335582}, doi = {10.1109/ACSSC.2017.8335582}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/acssc/BusireddygariK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acssc/BusireddygariK17a, author = {Prashanth Busireddygari and Subhash C. Kak}, editor = {Michael B. Matthews}, title = {Pseudorandom tableau sequences}, booktitle = {51st Asilomar Conference on Signals, Systems, and Computers, {ACSSC} 2017, Pacific Grove, CA, USA, October 29 - November 1, 2017}, pages = {1733--1736}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ACSSC.2017.8335657}, doi = {10.1109/ACSSC.2017.8335657}, timestamp = {Fri, 20 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acssc/BusireddygariK17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BusireddygariK17, author = {Prashanth Busireddygari and Subhash C. Kak}, title = {Binary primes sequence for cryptography and secure communication}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {570--574}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228686}, doi = {10.1109/CNS.2017.8228686}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/BusireddygariK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/Kak17, author = {Subhash C. Kak}, title = {Incomplete information and quantum decision trees}, booktitle = {2017 {IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2017, Banff, AB, Canada, October 5-8, 2017}, pages = {276--281}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SMC.2017.8122615}, doi = {10.1109/SMC.2017.8122615}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/Kak17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PrandlLPSK17, author = {Stefan Prandl and Mihai M. Lazarescu and Duc{-}Son Pham and Sieteng Soh and Subhash C. Kak}, title = {An Investigation of Power Law Probability Distributions for Network Anomaly Detection}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {217--222}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.20}, doi = {10.1109/SPW.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PrandlLPSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak17, author = {Subhash C. Kak}, title = {The Absent-Minded Driver Problem Redux}, journal = {CoRR}, volume = {abs/1702.05778}, year = {2017}, url = {http://arxiv.org/abs/1702.05778}, eprinttype = {arXiv}, eprint = {1702.05778}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak17a, author = {Subhash C. Kak}, title = {On Quantum Decision Trees}, journal = {CoRR}, volume = {abs/1703.03693}, year = {2017}, url = {http://arxiv.org/abs/1703.03693}, eprinttype = {arXiv}, eprint = {1703.03693}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BusireddygariK17, author = {Prashanth Busireddygari and Subhash C. Kak}, title = {Binary Prime Tableau Sequences}, journal = {CoRR}, volume = {abs/1704.08718}, year = {2017}, url = {http://arxiv.org/abs/1704.08718}, eprinttype = {arXiv}, eprint = {1704.08718}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BusireddygariK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak17aa, author = {Subhash C. Kak}, title = {The Limits to Machine Consciousness}, journal = {CoRR}, volume = {abs/1707.06257}, year = {2017}, url = {http://arxiv.org/abs/1707.06257}, eprinttype = {arXiv}, eprint = {1707.06257}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak17aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-04029, author = {Subhash C. Kak}, title = {Probability Reversal and the Disjunction Effect in Reasoning Systems}, journal = {CoRR}, volume = {abs/1709.04029}, year = {2017}, url = {http://arxiv.org/abs/1709.04029}, eprinttype = {arXiv}, eprint = {1709.04029}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-04029.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-04909, author = {Subhash C. Kak}, title = {Reasoning in Systems with Elements that Randomly Switch Characteristics}, journal = {CoRR}, volume = {abs/1712.04909}, year = {2017}, url = {http://arxiv.org/abs/1712.04909}, eprinttype = {arXiv}, eprint = {1712.04909}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-04909.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-09331, author = {Subhash C. Kak}, title = {Learning Based on {CC1} and {CC4} Neural Networks}, journal = {CoRR}, volume = {abs/1712.09331}, year = {2017}, url = {http://arxiv.org/abs/1712.09331}, eprinttype = {arXiv}, eprint = {1712.09331}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-09331.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak16, author = {Subhash C. Kak}, title = {Simulating entanglement in classical computing for cryptographic applications}, journal = {Cryptologia}, volume = {40}, number = {4}, pages = {348--354}, year = {2016}, url = {https://doi.org/10.1080/01611194.2015.1084959}, doi = {10.1080/01611194.2015.1084959}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssp/Kak16, author = {Subhash C. Kak}, title = {Generalized Unary Coding}, journal = {Circuits Syst. Signal Process.}, volume = {35}, number = {4}, pages = {1419--1426}, year = {2016}, url = {https://doi.org/10.1007/s00034-015-0120-7}, doi = {10.1007/S00034-015-0120-7}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cssp/Kak16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KirthiK16, author = {Krishnamurthy Kirthi and Subhash C. Kak}, title = {The Narayana Universal Code}, journal = {CoRR}, volume = {abs/1601.07110}, year = {2016}, url = {http://arxiv.org/abs/1601.07110}, eprinttype = {arXiv}, eprint = {1601.07110}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KirthiK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ReddyK16, author = {B. Prashanth Reddy and Subhash C. Kak}, title = {The binary primes sequence for computational hardening of pseudorandom sequences}, journal = {CoRR}, volume = {abs/1606.00410}, year = {2016}, url = {http://arxiv.org/abs/1606.00410}, eprinttype = {arXiv}, eprint = {1606.00410}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ReddyK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssp/Kak15, author = {Subhash C. Kak}, title = {Orthogonal Residue Sequences}, journal = {Circuits Syst. Signal Process.}, volume = {34}, number = {3}, pages = {1017--1025}, year = {2015}, url = {https://doi.org/10.1007/s00034-014-9879-1}, doi = {10.1007/S00034-014-9879-1}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cssp/Kak15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak15, author = {Subhash C. Kak}, title = {Extended Unary Coding}, journal = {CoRR}, volume = {abs/1502.00894}, year = {2015}, url = {http://arxiv.org/abs/1502.00894}, eprinttype = {arXiv}, eprint = {1502.00894}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KirthiK15, author = {Krishnamurthy Kirthi and Subhash C. Kak}, title = {A Class of Random Sequences for Key Generation}, journal = {CoRR}, volume = {abs/1503.03821}, year = {2015}, url = {http://arxiv.org/abs/1503.03821}, eprinttype = {arXiv}, eprint = {1503.03821}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KirthiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChanRVKC15, author = {Kam Wai Clifford Chan and Mayssaa El Rifai and Pramode K. Verma and Subhash C. Kak and Yuhua Chen}, title = {Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption}, journal = {CoRR}, volume = {abs/1503.05793}, year = {2015}, url = {http://arxiv.org/abs/1503.05793}, eprinttype = {arXiv}, eprint = {1503.05793}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChanRVKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak15a, author = {Subhash C. Kak}, title = {Oblivious Transfer Protocol with Verification}, journal = {CoRR}, volume = {abs/1504.00601}, year = {2015}, url = {http://arxiv.org/abs/1504.00601}, eprinttype = {arXiv}, eprint = {1504.00601}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak15b, author = {Subhash C. Kak}, title = {Multiparty Probability Computation and Verification}, journal = {CoRR}, volume = {abs/1505.05081}, year = {2015}, url = {http://arxiv.org/abs/1505.05081}, eprinttype = {arXiv}, eprint = {1505.05081}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SohLK15, author = {Sieteng Soh and Gongqi Lin and Subhash C. Kak}, title = {Connectivity in Social Networks}, journal = {CoRR}, volume = {abs/1506.03377}, year = {2015}, url = {http://arxiv.org/abs/1506.03377}, eprinttype = {arXiv}, eprint = {1506.03377}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/SohLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak15c, author = {Subhash C. Kak}, title = {Two Power Series Models of Self-Similarity in Social Networks}, journal = {CoRR}, volume = {abs/1506.07497}, year = {2015}, url = {http://arxiv.org/abs/1506.07497}, eprinttype = {arXiv}, eprint = {1506.07497}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KakP14, author = {Subhash C. Kak and Monisha Prabhu}, title = {Cryptographic Applications of Primitive Pythagorean Triples}, journal = {Cryptologia}, volume = {38}, number = {3}, pages = {215--222}, year = {2014}, url = {https://doi.org/10.1080/01611194.2014.915257}, doi = {10.1080/01611194.2014.915257}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KakP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssp/Kak14, author = {Subhash C. Kak}, title = {The Number Theoretic Hilbert Transform}, journal = {Circuits Syst. Signal Process.}, volume = {33}, number = {8}, pages = {2539--2548}, year = {2014}, url = {https://doi.org/10.1007/s00034-014-9759-8}, doi = {10.1007/S00034-014-9759-8}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cssp/Kak14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JiCZK14, author = {Shiyu Ji and Tingting Chen and Sheng Zhong and Subhash C. Kak}, title = {{DAWN:} Defending against wormhole attacks in wireless network coding systems}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {664--672}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6847992}, doi = {10.1109/INFOCOM.2014.6847992}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/JiCZK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/YuK14, author = {Sheng Yu and Subhash C. Kak}, editor = {Witold Pedrycz and Shyi{-}Ming Chen}, title = {Social Network Dynamics: An Attention Economics Perspective}, booktitle = {Social Networks: {A} Framework of Computational Intelligence}, series = {Studies in Computational Intelligence}, volume = {526}, pages = {225--258}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-02993-1\_11}, doi = {10.1007/978-3-319-02993-1\_11}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/sci/YuK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak14, author = {Subhash C. Kak}, title = {Efficiency of Matrix Multiplication on the Cross-Wired Mesh Array}, journal = {CoRR}, volume = {abs/1411.3273}, year = {2014}, url = {http://arxiv.org/abs/1411.3273}, eprinttype = {arXiv}, eprint = {1411.3273}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak14a, author = {Subhash C. Kak}, title = {Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography}, journal = {CoRR}, volume = {abs/1411.3645}, year = {2014}, url = {http://arxiv.org/abs/1411.3645}, eprinttype = {arXiv}, eprint = {1411.3645}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak14b, author = {Subhash C. Kak}, title = {Spread Unary Coding}, journal = {CoRR}, volume = {abs/1412.6122}, year = {2014}, url = {http://arxiv.org/abs/1412.6122}, eprinttype = {arXiv}, eprint = {1412.6122}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak14c, author = {Subhash C. Kak}, title = {Friendship Paradox and Attention Economics}, journal = {CoRR}, volume = {abs/1412.7049}, year = {2014}, url = {http://arxiv.org/abs/1412.7049}, eprinttype = {arXiv}, eprint = {1412.7049}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak14c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChenKVMRP13, author = {Yuhua Chen and Subhash C. Kak and Pramode K. Verma and Gregory Macdonald and Mayssaa El Rifai and Nikhil Punekar}, title = {Multi-photon tolerant secure quantum communication - From theory to practice}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {2111--2116}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6654838}, doi = {10.1109/ICC.2013.6654838}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChenKVMRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/MandalMRPZCKVHS13, author = {Sayonnha Mandal and Gregory Macdonald and Mayssaa El Rifai and Nikhil Punekar and Farnaz Zamani and Yuhua Chen and Subhash C. Kak and Pramode K. Verma and Robert C. Huck and James J. Sluss Jr.}, title = {Multi-photon implementation of three-stage quantum cryptography protocol}, booktitle = {The International Conference on Information Networking 2013, {ICOIN} 2013, Bangkok, Thailand, January 28-30, 2013}, pages = {6--11}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICOIN.2013.6496343}, doi = {10.1109/ICOIN.2013.6496343}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/MandalMRPZCKVHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-0313, author = {Subhash C. Kak}, title = {The Piggy Bank Cryptographic Trope}, journal = {CoRR}, volume = {abs/1301.0313}, year = {2013}, url = {http://arxiv.org/abs/1301.0313}, eprinttype = {arXiv}, eprint = {1301.0313}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-0313.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1304-4273, author = {Gunjan Talati and Subhash C. Kak}, title = {The Quartic Public Key Transformation}, journal = {CoRR}, volume = {abs/1304.4273}, year = {2013}, url = {http://arxiv.org/abs/1304.4273}, eprinttype = {arXiv}, eprint = {1304.4273}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1304-4273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1304-4651, author = {Gunjan Talati and Subhash C. Kak}, title = {Generalized Public Key Transformations with Side Information}, journal = {CoRR}, volume = {abs/1304.4651}, year = {2013}, url = {http://arxiv.org/abs/1304.4651}, eprinttype = {arXiv}, eprint = {1304.4651}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1304-4651.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1305-1900, author = {Subhash C. Kak}, title = {Residue Classes of the {PPT} Sequence}, journal = {CoRR}, volume = {abs/1305.1900}, year = {2013}, url = {http://arxiv.org/abs/1305.1900}, eprinttype = {arXiv}, eprint = {1305.1900}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1305-1900.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/StoweK13, author = {Matt Stowe and Subhash C. Kak}, title = {Neural Network Capacity for Multilevel Inputs}, journal = {CoRR}, volume = {abs/1307.8104}, year = {2013}, url = {http://arxiv.org/abs/1307.8104}, eprinttype = {arXiv}, eprint = {1307.8104}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/StoweK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak13, author = {Subhash C. Kak}, title = {The Number Theoretic Hilbert Transform}, journal = {CoRR}, volume = {abs/1308.1688}, year = {2013}, url = {http://arxiv.org/abs/1308.1688}, eprinttype = {arXiv}, eprint = {1308.1688}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak13a, author = {Subhash C. Kak}, title = {Probability and the Classical/Quantum Divide}, journal = {CoRR}, volume = {abs/1309.2238}, year = {2013}, url = {http://arxiv.org/abs/1309.2238}, eprinttype = {arXiv}, eprint = {1309.2238}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak13b, author = {Subhash C. Kak}, title = {Threshold Quantum Cryptography}, journal = {CoRR}, volume = {abs/1310.6333}, year = {2013}, url = {http://arxiv.org/abs/1310.6333}, eprinttype = {arXiv}, eprint = {1310.6333}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak13c, author = {Subhash C. Kak}, title = {A Class of Orthogonal Sequences}, journal = {CoRR}, volume = {abs/1311.6821}, year = {2013}, url = {http://arxiv.org/abs/1311.6821}, eprinttype = {arXiv}, eprint = {1311.6821}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak13d, author = {Subhash C. Kak}, title = {A Key Set Cipher for Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1312.2539}, year = {2013}, url = {http://arxiv.org/abs/1312.2539}, eprinttype = {arXiv}, eprint = {1312.2539}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgct/YuK12, author = {Sheng Yu and Subhash C. Kak}, title = {An empirical study of how users adopt famous entities}, booktitle = {First International Conference on Future Generation Communication Technologies {(FGST} 2012), London, United Kingdom, December 12-14, 2012}, pages = {64--69}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/FGCT.2012.6476555}, doi = {10.1109/FGCT.2012.6476555}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgct/YuK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/Chan-TinCK12, author = {Grajzer Chan{-}Tin and Tingting Chen and Subhash C. Kak}, title = {A Comprehensive Security Model for Networking Applications}, booktitle = {21st International Conference on Computer Communications and Networks, {ICCCN} 2012, Munich, Germany, July 30 - August 2, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCCN.2012.6289238}, doi = {10.1109/ICCCN.2012.6289238}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/Chan-TinCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1202-0200, author = {Sindhu Chitikela and Subhash C. Kak}, title = {Increasing Randomness Using Permutations on Blocks}, journal = {CoRR}, volume = {abs/1202.0200}, year = {2012}, url = {http://arxiv.org/abs/1202.0200}, eprinttype = {arXiv}, eprint = {1202.0200}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1202-0200.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-1647, author = {Sheng Yu and Subhash C. Kak}, title = {A Survey of Prediction Using Social Media}, journal = {CoRR}, volume = {abs/1203.1647}, year = {2012}, url = {http://arxiv.org/abs/1203.1647}, eprinttype = {arXiv}, eprint = {1203.1647}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-1647.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1206-6778, author = {Subhash C. Kak and Yuhua Chen and Pramode K. Verma}, title = {iAQC: The Intensity-Aware Quantum Cryptography Protocol}, journal = {CoRR}, volume = {abs/1206.6778}, year = {2012}, url = {http://arxiv.org/abs/1206.6778}, eprinttype = {arXiv}, eprint = {1206.6778}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1206-6778.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-6307, author = {Krishnama Raju Kanchu and Subhash C. Kak}, title = {On Randomness of Goldbach Sequences}, journal = {CoRR}, volume = {abs/1207.6307}, year = {2012}, url = {http://arxiv.org/abs/1207.6307}, eprinttype = {arXiv}, eprint = {1207.6307}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-6307.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-1984, author = {Krishnama Raju Kanchu and Subhash C. Kak}, title = {Goldbach Ellipse Sequences for Cryptographic Applications}, journal = {CoRR}, volume = {abs/1208.1984}, year = {2012}, url = {http://arxiv.org/abs/1208.1984}, eprinttype = {arXiv}, eprint = {1208.1984}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-1984.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-6198, author = {Sayonnha Mandal and Gregory Macdonald and Mayssaa El Rifai and Nikhil Punekar and Farnaz Zamani and Yuhua Chen and Subhash C. Kak and Pramode K. Verma and Robert C. Huck and James J. Sluss Jr.}, title = {Implementation of Secure Quantum Protocol using Multiple Photons for Communication}, journal = {CoRR}, volume = {abs/1208.6198}, year = {2012}, url = {http://arxiv.org/abs/1208.6198}, eprinttype = {arXiv}, eprint = {1208.6198}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-6198.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-0135, author = {Deepthi Cherlopalle and Subhash C. Kak}, title = {Goldbach Triples and Key Distribution}, journal = {CoRR}, volume = {abs/1209.0135}, year = {2012}, url = {http://arxiv.org/abs/1209.0135}, eprinttype = {arXiv}, eprint = {1209.0135}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-0135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-1323, author = {Sheng Yu and Subhash C. Kak}, title = {An Empirical Study of How Users Adopt Famous Entities}, journal = {CoRR}, volume = {abs/1209.1323}, year = {2012}, url = {http://arxiv.org/abs/1209.1323}, eprinttype = {arXiv}, eprint = {1209.1323}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-1323.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-4621, author = {Krishnama Raju Kanchu and Subhash C. Kak}, title = {Goldbach Circles and Balloons and Their Cross Correlation}, journal = {CoRR}, volume = {abs/1209.4621}, year = {2012}, url = {http://arxiv.org/abs/1209.4621}, eprinttype = {arXiv}, eprint = {1209.4621}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-4621.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-4614, author = {Subhash C. Kak}, title = {Random Sequences Based on the Divisor Pairs Function}, journal = {CoRR}, volume = {abs/1210.4614}, year = {2012}, url = {http://arxiv.org/abs/1210.4614}, eprinttype = {arXiv}, eprint = {1210.4614}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-4614.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-8398, author = {Sandeep Hosangadi and Subhash C. Kak}, title = {An Alignment Algorithm for Sequences}, journal = {CoRR}, volume = {abs/1210.8398}, year = {2012}, url = {http://arxiv.org/abs/1210.8398}, eprinttype = {arXiv}, eprint = {1210.8398}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-8398.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1211-2751, author = {Monisha Prabhu and Subhash C. Kak}, title = {Random Sequences from Primitive Pythagorean Triples}, journal = {CoRR}, volume = {abs/1211.2751}, year = {2012}, url = {http://arxiv.org/abs/1211.2751}, eprinttype = {arXiv}, eprint = {1211.2751}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1211-2751.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ParakhK11, author = {Abhishek Parakh and Subhash C. Kak}, title = {Space efficient secret sharing for implicit data security}, journal = {Inf. Sci.}, volume = {181}, number = {2}, pages = {335--341}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2010.09.013}, doi = {10.1016/J.INS.2010.09.013}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ParakhK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/ParakhK11, author = {Abhishek Parakh and Subhash C. Kak}, title = {Matrix based key agreement algorithms for sensor networks}, booktitle = {Fifth {IEEE} International Conference on Advanced Telecommunication Systems and Networks, {ANTS} 2011, December 18-21, 2011 Bengaluru, India}, pages = {1--3}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ANTS.2011.6163684}, doi = {10.1109/ANTS.2011.6163684}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/IEEEants/ParakhK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adcons/ParakhK11, author = {Abhishek Parakh and Subhash C. Kak}, editor = {P. Santhi Thilagam and Alwyn Roshan Pais and K. Chandrasekaran and N. Balakrishnan}, title = {A New Small World Lattice}, booktitle = {Advanced Computing, Networking and Security - International Conference, {ADCONS} 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7135}, pages = {1--8}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29280-4\_1}, doi = {10.1007/978-3-642-29280-4\_1}, timestamp = {Mon, 29 Jun 2020 13:10:10 +0200}, biburl = {https://dblp.org/rec/conf/adcons/ParakhK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/GundaCCK11, author = {Raviteja Gunda and Joe Cecil and Prasad Calyam and Subhash C. Kak}, editor = {Robert Meersman and Tharam S. Dillon and Pilar Herrero}, title = {Information Centric Frameworks for Micro Assembly}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2011 Workshops - Confederated International Workshops and Posters: {EI2N+NSF} ICE, ICSP+INBAST, ISDE, ORM, OTMA, SWWS+MONET+SeDeS, and {VADER} 2011, Hersonissos, Crete, Greece, October 17-21, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7046}, pages = {93--101}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25126-9\_17}, doi = {10.1007/978-3-642-25126-9\_17}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/otm/GundaCCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-4573, author = {Subhash C. Kak}, title = {The Algebra of Two Dimensional Patterns}, journal = {CoRR}, volume = {abs/1102.4573}, year = {2011}, url = {http://arxiv.org/abs/1102.4573}, eprinttype = {arXiv}, eprint = {1102.4573}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-4573.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ParakhK10, author = {Abhishek Parakh and Subhash C. Kak}, title = {Internet Voting Protocol Based on Improved Implicit Security}, journal = {Cryptologia}, volume = {34}, number = {3}, pages = {258--268}, year = {2010}, url = {https://doi.org/10.1080/01611194.2010.485421}, doi = {10.1080/01611194.2010.485421}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ParakhK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iim/ChenKW10, author = {Yuhua Chen and Subhash C. Kak and Lei Wang}, title = {Hybrid Neural Network Architecture for On-Line Learning}, journal = {Intell. Inf. Manag.}, volume = {2}, number = {4}, pages = {253--261}, year = {2010}, url = {https://doi.org/10.4236/iim.2010.23030}, doi = {10.4236/IIM.2010.23030}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iim/ChenKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/KakCW10, author = {Subhash C. Kak and Yuhua Chen and Lei Wang}, editor = {Martin Santana and Jerry N. Luftman and Ajay S. Vinze}, title = {Data Mining Using Surface and Deep Agents Based on Neural Networks}, booktitle = {Sustainable {IT} Collaboration Around the Globe. 16th Americas Conference on Information Systems, {AMCIS} 2010, Lima, Peru, August 12-15, 2010}, pages = {16}, publisher = {Association for Information Systems}, year = {2010}, url = {http://aisel.aisnet.org/amcis2010/16}, timestamp = {Mon, 05 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/KakCW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ParakhK10, author = {Abhishek Parakh and Subhash C. Kak}, title = {A Tree Based Recursive Information Hiding Scheme}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502430}, doi = {10.1109/ICC.2010.5502430}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ParakhK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-1711, author = {Abhishek Parakh and Subhash C. Kak}, title = {Internet voting protocol based on implicit data security}, journal = {CoRR}, volume = {abs/1001.1711}, year = {2010}, url = {http://arxiv.org/abs/1001.1711}, eprinttype = {arXiv}, eprint = {1001.1711}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-1711.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-1936, author = {Abhishek Parakh and Subhash C. Kak}, title = {A Key Distribution Scheme for Sensor Networks Using Structured Graphs}, journal = {CoRR}, volume = {abs/1001.1936}, year = {2010}, url = {http://arxiv.org/abs/1001.1936}, eprinttype = {arXiv}, eprint = {1001.1936}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-1936.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-2326, author = {Abhishek Parakh and Subhash C. Kak}, title = {A Distributed Data Storage Scheme for Sensor Networks}, journal = {CoRR}, volume = {abs/1001.2326}, year = {2010}, url = {http://arxiv.org/abs/1001.2326}, eprinttype = {arXiv}, eprint = {1001.2326}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-2326.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-3331, author = {Abhishek Parakh and Subhash C. Kak}, title = {Recursive Secret Sharing for Distributed Storage and Information Hiding}, journal = {CoRR}, volume = {abs/1001.3331}, year = {2010}, url = {http://arxiv.org/abs/1001.3331}, eprinttype = {arXiv}, eprint = {1001.3331}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-3331.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1002-3409, author = {Subhash C. Kak}, title = {Aryabhata's Mathematics}, journal = {CoRR}, volume = {abs/1002.3409}, year = {2010}, url = {http://arxiv.org/abs/1002.3409}, eprinttype = {arXiv}, eprint = {1002.3409}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1002-3409.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-3770, author = {Subhash C. Kak}, title = {Pythagorean Triples and Cryptographic Coding}, journal = {CoRR}, volume = {abs/1004.3770}, year = {2010}, url = {http://arxiv.org/abs/1004.3770}, eprinttype = {arXiv}, eprint = {1004.3770}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-3770.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1009-4495, author = {Subhash C. Kak}, title = {Unary Coding for Neural Network Learning}, journal = {CoRR}, volume = {abs/1009.4495}, year = {2010}, url = {http://arxiv.org/abs/1009.4495}, eprinttype = {arXiv}, eprint = {1009.4495}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1009-4495.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1010-5421, author = {Subhash C. Kak}, title = {On the Mesh Array for Matrix Multiplication}, journal = {CoRR}, volume = {abs/1010.5421}, year = {2010}, url = {http://arxiv.org/abs/1010.5421}, eprinttype = {arXiv}, eprint = {1010.5421}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1010-5421.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1011-4093, author = {Praveen Kuruvada and Daniel Asamoah and Nikunj Dalal and Subhash C. Kak}, title = {The Use of Rapid Digital Game Creation to Learn Computational Thinking}, journal = {CoRR}, volume = {abs/1011.4093}, year = {2010}, url = {http://arxiv.org/abs/1011.4093}, eprinttype = {arXiv}, eprint = {1011.4093}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1011-4093.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijshc/DalalDKAS09, author = {Nikunj Dalal and Parth Dalal and Subhash C. Kak and Pavlo D. Antonenko and Susan Stansberry}, title = {Rapid digital game creation for broadening participation in computing and fostering crucial thinking skills}, journal = {Int. J. Soc. Humanist. Comput.}, volume = {1}, number = {2}, pages = {123--137}, year = {2009}, url = {https://doi.org/10.1504/IJSHC.2009.031002}, doi = {10.1504/IJSHC.2009.031002}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijshc/DalalDKAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ParakhK09, author = {Abhishek Parakh and Subhash C. Kak}, title = {Online data storage using implicit security}, journal = {Inf. Sci.}, volume = {179}, number = {19}, pages = {3323--3331}, year = {2009}, url = {https://doi.org/10.1016/j.ins.2009.05.013}, doi = {10.1016/J.INS.2009.05.013}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ParakhK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenVK09, author = {Yuhua Chen and Pramode K. Verma and Subhash C. Kak}, title = {Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks}, journal = {Secur. Commun. Networks}, volume = {2}, number = {6}, pages = {546--554}, year = {2009}, url = {https://doi.org/10.1002/sec.98}, doi = {10.1002/SEC.98}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenVK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbc/SattiK09, author = {Maruti Satti and Subhash C. Kak}, title = {Multilevel Indexed Quasigroup Encryption for Data and Speech}, journal = {{IEEE} Trans. Broadcast.}, volume = {55}, number = {2}, pages = {270--281}, year = {2009}, url = {https://doi.org/10.1109/TBC.2009.2014993}, doi = {10.1109/TBC.2009.2014993}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbc/SattiK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csedu/DalalDK09, author = {Parth Dalal and Nikunj Dalal and Subhash C. Kak}, editor = {Jos{\'{e}} A. Moinhos Cordeiro and Boris Shishkov and Alexander Verbraeck and Markus Helfert}, title = {Learning Computer Programming with Game Design}, booktitle = {{CSEDU} 2009 - Proceedings of the First International Conference on Computer Supported Education, Lisboa, Portugal, March 23-26, 2009 - Volume 2}, pages = {135--138}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Mon, 05 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csedu/DalalDK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/ParakhK09, author = {Abhishek Parakh and Subhash C. Kak}, editor = {Andreas U. Schmidt and Shiguo Lian}, title = {A Distributed Data Storage Scheme for Sensor Networks}, booktitle = {Security and Privacy in Mobile Information and Communication Systems, First International {ICST} Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {17}, pages = {14--22}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04434-2\_2}, doi = {10.1007/978-3-642-04434-2\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/ParakhK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ParakhK09, author = {Abhishek Parakh and Subhash C. Kak}, title = {Space Efficient Secret Sharing}, journal = {CoRR}, volume = {abs/0901.4798}, year = {2009}, url = {http://arxiv.org/abs/0901.4798}, eprinttype = {arXiv}, eprint = {0901.4798}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ParakhK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ParakhK09a, author = {Abhishek Parakh and Subhash C. Kak}, title = {Space Efficient Secret Sharing: {A} Recursive Approach}, journal = {CoRR}, volume = {abs/0901.4814}, year = {2009}, url = {http://arxiv.org/abs/0901.4814}, eprinttype = {arXiv}, eprint = {0901.4814}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ParakhK09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0902-2487, author = {Abhishek Parakh and Subhash C. Kak}, title = {A Recursive Threshold Visual Cryptography Scheme}, journal = {CoRR}, volume = {abs/0902.2487}, year = {2009}, url = {http://arxiv.org/abs/0902.2487}, eprinttype = {arXiv}, eprint = {0902.2487}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0902-2487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0905-2977, author = {Subhash C. Kak}, title = {Cryptography for Multi-Located Parties}, journal = {CoRR}, volume = {abs/0905.2977}, year = {2009}, url = {http://arxiv.org/abs/0905.2977}, eprinttype = {arXiv}, eprint = {0905.2977}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0905-2977.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0905-3771, author = {Subhash C. Kak}, title = {Memory Retrieved from Single Neurons}, journal = {CoRR}, volume = {abs/0905.3771}, year = {2009}, url = {http://arxiv.org/abs/0905.3771}, eprinttype = {arXiv}, eprint = {0905.3771}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0905-3771.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0906-0798, author = {Subhash C. Kak}, title = {Single Neuron Memories and the Network's Proximity Matrix}, journal = {CoRR}, volume = {abs/0906.0798}, year = {2009}, url = {http://arxiv.org/abs/0906.0798}, eprinttype = {arXiv}, eprint = {0906.0798}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0906-0798.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak09, author = {Subhash C. Kak}, title = {The Transactional Nature of Quantum Information}, journal = {CoRR}, volume = {abs/0907.2465}, year = {2009}, url = {http://arxiv.org/abs/0907.2465}, eprinttype = {arXiv}, eprint = {0907.2465}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0907-5226, author = {Subhash C. Kak}, title = {Recursive Random Number Generator Using Prime Reciprocals}, journal = {CoRR}, volume = {abs/0907.5226}, year = {2009}, url = {http://arxiv.org/abs/0907.5226}, eprinttype = {arXiv}, eprint = {0907.5226}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0907-5226.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0908-3148, author = {Subhash C. Kak}, title = {Another Look at Quantum Neural Computing}, journal = {CoRR}, volume = {abs/0908.3148}, year = {2009}, url = {http://arxiv.org/abs/0908.3148}, eprinttype = {arXiv}, eprint = {0908.3148}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0908-3148.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParakhK09, author = {Abhishek Parakh and Subhash C. Kak}, title = {Space Efficient Secret Sharing: {A} Recursive Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2009}, url = {http://eprint.iacr.org/2009/365}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParakhK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParakhK09a, author = {Abhishek Parakh and Subhash C. Kak}, title = {A Tree Based Recursive Scheme for Space Efficient Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2009}, url = {http://eprint.iacr.org/2009/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParakhK09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ParakhK08, author = {Abhishek Parakh and Subhash C. Kak}, title = {Internet Voting Protocol Based on Implicit Data Security}, booktitle = {Proceedings of the 17th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2008, St. Thomas, {U.S.} Virgin Islands, August 3-7, 2008}, pages = {743--746}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICCCN.2008.ECP.140}, doi = {10.1109/ICCCN.2008.ECP.140}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/ParakhK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0801-1336, author = {Subhash C. Kak}, title = {Stream Computing}, journal = {CoRR}, volume = {abs/0801.1336}, year = {2008}, url = {http://arxiv.org/abs/0801.1336}, eprinttype = {arXiv}, eprint = {0801.1336}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0801-1336.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0809-5087, author = {Yuhua Chen and Subhash C. Kak and Lei Wang}, title = {Hybrid Neural Network Architecture for On-Line Learning}, journal = {CoRR}, volume = {abs/0809.5087}, year = {2008}, url = {http://arxiv.org/abs/0809.5087}, eprinttype = {arXiv}, eprint = {0809.5087}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0809-5087.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParakhK08, author = {Abhishek Parakh and Subhash C. Kak}, title = {A Recursive Threshold Visual Cryptography Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2008}, url = {http://eprint.iacr.org/2008/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParakhK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbc/ParthasarathyK07, author = {Arvind Kumar Parthasarathy and Subhash C. Kak}, title = {An Improved Method of Content Based Image Watermarking}, journal = {{IEEE} Trans. Broadcast.}, volume = {53}, number = {2}, pages = {468--479}, year = {2007}, url = {https://doi.org/10.1109/TBC.2007.894947}, doi = {10.1109/TBC.2007.894947}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbc/ParthasarathyK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ubiquity/ParakhK07, author = {Abhishek Parakh and Subhash C. Kak}, title = {How to improve security in electronic voting?}, journal = {Ubiquity}, volume = {2007}, number = {February}, pages = {2:1--2:7}, year = {2007}, url = {http://doi.acm.org/10.1145/1238607.1238608}, doi = {10.1145/1238607.1238608}, timestamp = {Sun, 08 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ubiquity/ParakhK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/PenumarthiK06, author = {Kiranmayi Penumarthi and Subhash C. Kak}, title = {Augmented Watermarking}, journal = {Cryptologia}, volume = {30}, number = {2}, pages = {173--180}, year = {2006}, url = {https://doi.org/10.1080/01611190500541824}, doi = {10.1080/01611190500541824}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/PenumarthiK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ubiquity/KakDD06, author = {Subhash C. Kak and C. Donald and Elaine T. Delaune}, title = {On the realizability of quantum computers}, journal = {Ubiquity}, volume = {2006}, number = {March}, pages = {3:1}, year = {2006}, url = {http://doi.acm.org/10.1145/1125359.1125360}, doi = {10.1145/1125359.1125360}, timestamp = {Mon, 09 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ubiquity/KakDD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0601052, author = {Subhash C. Kak}, title = {Artificial and Biological Intelligence}, journal = {CoRR}, volume = {abs/cs/0601052}, year = {2006}, url = {http://arxiv.org/abs/cs/0601052}, eprinttype = {arXiv}, eprint = {cs/0601052}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0601052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0602003, author = {Navneet Mandhani and Subhash C. Kak}, title = {Watermarking Using Decimal Sequences}, journal = {CoRR}, volume = {abs/cs/0602003}, year = {2006}, url = {http://arxiv.org/abs/cs/0602003}, eprinttype = {arXiv}, eprint = {cs/0602003}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0602003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0602097, author = {Subhash C. Kak}, title = {The Cubic Public-Key Transformation}, journal = {CoRR}, volume = {abs/cs/0602097}, year = {2006}, url = {http://arxiv.org/abs/cs/0602097}, eprinttype = {arXiv}, eprint = {cs/0602097}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0602097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak06, author = {Subhash C. Kak}, title = {Quantum Information and Entropy}, journal = {CoRR}, volume = {abs/quant-ph/0605096}, year = {2006}, url = {http://arxiv.org/abs/quant-ph/0605096}, eprinttype = {arXiv}, eprint = {quant-ph/0605096}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MandhaniK05, author = {Navneet Mandhani and Subhash C. Kak}, title = {Watermarking Using Decimal Sequences}, journal = {Cryptologia}, volume = {29}, number = {1}, pages = {50--58}, year = {2005}, url = {https://doi.org/10.1080/0161-110591893762}, doi = {10.1080/0161-110591893762}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MandhaniK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ubiquity/KakDD05, author = {Subhash C. Kak and C. Donald and Elaine T. Delaune}, title = {Artificial and Biological Intelligence}, journal = {Ubiquity}, volume = {2005}, number = {November}, pages = {1}, year = {2005}, url = {http://doi.acm.org/10.1145/1103046.1103047}, doi = {10.1145/1103046.1103047}, timestamp = {Tue, 10 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ubiquity/KakDD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kak05, author = {Subhash C. Kak}, title = {A Three-Stage Quantum Cryptography Protocol}, journal = {CoRR}, volume = {abs/quant-ph/0503027}, year = {2005}, url = {http://arxiv.org/abs/quant-ph/0503027}, eprinttype = {arXiv}, eprint = {quant-ph/0503027}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kak05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Kak03, author = {Subhash C. Kak}, title = {General qubit errors cannot be corrected}, journal = {Inf. Sci.}, volume = {152}, pages = {195--202}, year = {2003}, url = {https://doi.org/10.1016/S0020-0255(02)00410-3}, doi = {10.1016/S0020-0255(02)00410-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Kak03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GnanaguruparanK02, author = {Meenakshi Gnanaguruparan and Subhash C. Kak}, title = {Recursive Hiding of Secrets in Visual Cryptography}, journal = {Cryptologia}, volume = {26}, number = {1}, pages = {68--76}, year = {2002}, url = {https://doi.org/10.1080/0161-110291890768}, doi = {10.1080/0161-110291890768}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GnanaguruparanK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Kak02, author = {Subhash C. Kak}, title = {A class of instantaneously trained neural networks}, journal = {Inf. Sci.}, volume = {148}, number = {1-4}, pages = {97--102}, year = {2002}, url = {https://doi.org/10.1016/S0020-0255(02)00281-5}, doi = {10.1016/S0020-0255(02)00281-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Kak02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jcis/Kak02, author = {Subhash C. Kak}, editor = {H. John Caulfield and Shu{-}Heng Chen and Heng{-}Da Cheng and Richard J. Duro and Vasant G. Honavar and Etienne E. Kerre and Mi Lu and Manuel Gra{\~{n}}a Romay and Timothy K. Shih and Dan Ventura and Paul P. Wang and Yuanyuan Yang}, title = {A Class of Instantaneously Trained Neural Networks}, booktitle = {Proceedings of the 6th Joint Conference on Information Science, March 8-13, 2002, Research Triangle Park, North Carolina, {USA}}, pages = {19--22}, publisher = {{JCIS} / Association for Intelligent Machinery, Inc.}, year = {2002}, timestamp = {Mon, 13 Nov 2017 18:15:11 +0100}, biburl = {https://dblp.org/rec/conf/jcis/Kak02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Kak00, author = {Subhash C. Kak}, title = {Active agents, intelligence and quantum computing}, journal = {Inf. Sci.}, volume = {128}, number = {1-2}, pages = {1--17}, year = {2000}, url = {https://doi.org/10.1016/S0020-0255(00)00043-8}, doi = {10.1016/S0020-0255(00)00043-8}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/Kak00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/VenturaK00, author = {Dan Ventura and Subhash C. Kak}, title = {Quantum computing and neural information processing}, journal = {Inf. Sci.}, volume = {128}, number = {3-4}, pages = {147--148}, year = {2000}, url = {https://doi.org/10.1016/S0020-0255(00)00049-9}, doi = {10.1016/S0020-0255(00)00049-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/VenturaK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Kak00a, author = {Subhash C. Kak}, title = {Rotating a qubit}, journal = {Inf. Sci.}, volume = {128}, number = {3-4}, pages = {149--154}, year = {2000}, url = {https://doi.org/10.1016/S0020-0255(00)00050-5}, doi = {10.1016/S0020-0255(00)00050-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Kak00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/TejomurtulaK99, author = {Sreenivas Tejomurtula and Subhash C. Kak}, title = {Inverse Kinematics in Robotics using Neural Networks}, journal = {Inf. Sci.}, volume = {116}, number = {2-4}, pages = {147--164}, year = {1999}, url = {https://doi.org/10.1016/S0020-0255(98)10098-1}, doi = {10.1016/S0020-0255(98)10098-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/TejomurtulaK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShuK99, author = {Bo Shu and Subhash C. Kak}, title = {A Neural Network-based Intelligent Metasearch Engine}, journal = {Inf. Sci.}, volume = {120}, number = {1-4}, pages = {1--11}, year = {1999}, url = {https://doi.org/10.1016/S0020-0255(99)00062-6}, doi = {10.1016/S0020-0255(99)00062-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShuK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Kak98, author = {Subhash C. Kak}, title = {On Generalization by Neural Networks}, journal = {Inf. Sci.}, volume = {111}, number = {1-4}, pages = {293--302}, year = {1998}, url = {https://doi.org/10.1016/S0020-0255(98)10009-9}, doi = {10.1016/S0020-0255(98)10009-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Kak98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak96, author = {Subhash C. Kak}, title = {An Indus-Sarasvat{\={\i}} Signboard}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {275--279}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884960}, doi = {10.1080/0161-119691884960}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Kak95, author = {Subhash C. Kak}, title = {On Quantum Neural Computing}, journal = {Inf. Sci.}, volume = {83}, number = {3{\&}4}, pages = {143--160}, year = {1995}, url = {https://doi.org/10.1016/0020-0255(94)00095-S}, doi = {10.1016/0020-0255(94)00095-S}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Kak95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/Kak94, author = {Subhash C. Kak}, title = {New algorithms for training feedforward neural networks}, journal = {Pattern Recognit. Lett.}, volume = {15}, number = {3}, pages = {295--298}, year = {1994}, url = {https://doi.org/10.1016/0167-8655(94)90062-0}, doi = {10.1016/0167-8655(94)90062-0}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/Kak94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Kak93, author = {Subhash C. Kak}, title = {Neural networks and artificial intelligence}, journal = {Inf. Sci.}, volume = {70}, number = {1-2}, pages = {1--3}, year = {1993}, url = {https://doi.org/10.1016/0020-0255(93)90045-N}, doi = {10.1016/0020-0255(93)90045-N}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Kak93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak90, author = {Subhash C. Kak}, title = {The Vararuchi Cipher}, journal = {Cryptologia}, volume = {14}, number = {1}, pages = {79--82}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864797}, doi = {10.1080/0161-119091864797}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak90a, author = {Subhash C. Kak}, title = {Indus and Brahmi Further Connections}, journal = {Cryptologia}, volume = {14}, number = {2}, pages = {169--183}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864878}, doi = {10.1080/0161-119091864878}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictai/Kak90, author = {Subhash C. Kak}, title = {Neural computing with structured information}, booktitle = {Proceedings of the 2nd International {IEEE} Conference on Tools for Artificial Intelligence, {TAI} 1990, Herndon, VA, USA, November 6-9, 1990}, pages = {359--365}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/TAI.1990.130363}, doi = {10.1109/TAI.1990.130363}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictai/Kak90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak89, author = {Subhash C. Kak}, title = {A New Method for Coin Flipping by Telephone}, journal = {Cryptologia}, volume = {13}, number = {1}, pages = {73--78}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863781}, doi = {10.1080/0161-118991863781}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak88, author = {Subhash C. Kak}, title = {The Aryabhata Cipher}, journal = {Cryptologia}, volume = {12}, number = {2}, pages = {113--117}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862855}, doi = {10.1080/0161-118891862855}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak88a, author = {Subhash C. Kak}, title = {A frequency Analysis of the Indus Script}, journal = {Cryptologia}, volume = {12}, number = {3}, pages = {129--143}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862873}, doi = {10.1080/0161-118891862873}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Kak88, author = {Subhash C. Kak}, title = {Multilayered array computing}, journal = {Inf. Sci.}, volume = {45}, number = {3}, pages = {347--365}, year = {1988}, url = {https://doi.org/10.1016/0020-0255(88)90010-2}, doi = {10.1016/0020-0255(88)90010-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Kak88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pc/Kak88, author = {Subhash C. Kak}, title = {A two-layered mesh array for matrix multiplication}, journal = {Parallel Comput.}, volume = {6}, number = {3}, pages = {383--385}, year = {1988}, url = {https://doi.org/10.1016/0167-8191(88)90078-6}, doi = {10.1016/0167-8191(88)90078-6}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pc/Kak88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak87, author = {Subhash C. Kak}, title = {The Study of the Indus Script General Considerations}, journal = {Cryptologia}, volume = {11}, number = {3}, pages = {182--191}, year = {1987}, url = {https://doi.org/10.1080/0161-118791862009}, doi = {10.1080/0161-118791862009}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijar/Kak87, author = {Subhash C. Kak}, title = {The Paninian approach to natural language processing}, journal = {Int. J. Approx. Reason.}, volume = {1}, number = {1}, pages = {117--130}, year = {1987}, url = {https://doi.org/10.1016/0888-613X(87)90007-7}, doi = {10.1016/0888-613X(87)90007-7}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijar/Kak87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Kak85, author = {Subhash C. Kak}, title = {How to Detect Tampering of Data}, journal = {Inf. Process. Lett.}, volume = {20}, number = {2}, pages = {109--110}, year = {1985}, url = {https://doi.org/10.1016/0020-0190(85)90074-2}, doi = {10.1016/0020-0190(85)90074-2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Kak85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Kak85, author = {Subhash C. Kak}, title = {Encryption and Error-Correction Coding Using \emph{D} Sequences}, journal = {{IEEE} Trans. Computers}, volume = {34}, number = {9}, pages = {803--809}, year = {1985}, url = {https://doi.org/10.1109/TC.1985.1676636}, doi = {10.1109/TC.1985.1676636}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Kak85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/Kak84, author = {Subhash C. Kak}, title = {On the method of puzzles for key distribution}, journal = {Int. J. Parallel Program.}, volume = {13}, number = {2}, pages = {103--109}, year = {1984}, url = {https://doi.org/10.1007/BF00978711}, doi = {10.1007/BF00978711}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpp/Kak84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kak83, author = {Subhash C. Kak}, title = {Data Security in Computer Networks: Guest Editor's Introduction}, journal = {Computer}, volume = {16}, number = {2}, pages = {8--10}, year = {1983}, url = {https://doi.org/10.1109/MC.1983.1654293}, doi = {10.1109/MC.1983.1654293}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Kak83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/Kak83, author = {Subhash C. Kak}, title = {Exponentiation modulo a polynomial for data security}, journal = {Int. J. Parallel Program.}, volume = {12}, number = {5}, pages = {337--346}, year = {1983}, url = {https://doi.org/10.1007/BF01008045}, doi = {10.1007/BF01008045}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpp/Kak83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Kak83, author = {Subhash C. Kak}, title = {A Structural Redundancy in \emph{d}-Sequences}, journal = {{IEEE} Trans. Computers}, volume = {32}, number = {11}, pages = {1069--1071}, year = {1983}, url = {https://doi.org/10.1109/TC.1983.1676160}, doi = {10.1109/TC.1983.1676160}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Kak83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Kak83, author = {Subhash C. Kak}, title = {Joint Encryption and Error-Correction Coding}, booktitle = {Proceedings of the 1983 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 25-27, 1983}, pages = {55--60}, publisher = {{IEEE} Computer Society}, year = {1983}, url = {https://doi.org/10.1109/SP.1983.10017}, doi = {10.1109/SP.1983.10017}, timestamp = {Thu, 21 Sep 2023 15:57:32 +0200}, biburl = {https://dblp.org/rec/conf/sp/Kak83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KakC81, author = {Subhash C. Kak and Amitava Chatterjee}, title = {On decimal sequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {27}, number = {5}, pages = {647}, year = {1981}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KakC81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kak81, author = {Subhash C. Kak}, editor = {Allen Gersho}, title = {Scrambling and Randomization}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {59--63}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Kak81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/Kak74, author = {Subhash C. Kak}, title = {Binary Sequences and Redundancy}, journal = {{IEEE} Trans. Syst. Man Cybern.}, volume = {4}, number = {4}, pages = {399--401}, year = {1974}, url = {https://doi.org/10.1109/TSMC.1974.5408465}, doi = {10.1109/TSMC.1974.5408465}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/Kak74.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.