BibTeX records: Subhash C. Kak

download as .bib file

@article{DBLP:journals/cssp/Kak24,
  author       = {Subhash C. Kak},
  title        = {Fractal Dimensions in Circular and Spiral Phenomena},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {43},
  number       = {1},
  pages        = {634--645},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00034-023-02482-4},
  doi          = {10.1007/S00034-023-02482-4},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cssp/Kak24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaic/Kak23,
  author       = {Subhash C. Kak},
  title        = {An Information Principle Based on Partitions for Cognitive Data},
  journal      = {J. Artif. Intell. Conscious.},
  volume       = {10},
  number       = {1},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.1142/S2705078522500138},
  doi          = {10.1142/S2705078522500138},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaic/Kak23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaic/Kak23a,
  author       = {Subhash C. Kak},
  title        = {No-Go Theorems on Machine Consciousness},
  journal      = {J. Artif. Intell. Conscious.},
  volume       = {10},
  number       = {2},
  pages        = {237--247},
  year         = {2023},
  url          = {https://doi.org/10.1142/s2705078523500029},
  doi          = {10.1142/S2705078523500029},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaic/Kak23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/Kak23,
  author       = {Subhash C. Kak},
  title        = {Linear Fractals with Weights},
  journal      = {Parallel Process. Lett.},
  volume       = {33},
  number       = {4},
  pages        = {2340011:1--2340011:14},
  year         = {2023},
  url          = {https://doi.org/10.1142/S012962642340011X},
  doi          = {10.1142/S012962642340011X},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppl/Kak23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/Kak23a,
  author       = {Subhash C. Kak},
  title        = {The Dimensionality of Genetic Information},
  journal      = {Parallel Process. Lett.},
  volume       = {33},
  number       = {4},
  pages        = {2340012:1--2340012:11},
  year         = {2023},
  url          = {https://doi.org/10.1142/S0129626423400121},
  doi          = {10.1142/S0129626423400121},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppl/Kak23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tib/Kak23,
  author       = {Subhash C. Kak},
  title        = {Self-similarity and the maximum entropy principle in the genetic code},
  journal      = {Theory Biosci.},
  volume       = {142},
  number       = {3},
  pages        = {205--210},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12064-023-00396-y},
  doi          = {10.1007/S12064-023-00396-Y},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tib/Kak23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/Kak22,
  author       = {Subhash C. Kak},
  title        = {New Classes of Regular Symmetric Fractals},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {41},
  number       = {7},
  pages        = {4149--4159},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00034-022-01966-z},
  doi          = {10.1007/S00034-022-01966-Z},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssp/Kak22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaic/Kak22,
  author       = {Subhash C. Kak},
  title        = {The Limits to Machine Consciousness},
  journal      = {J. Artif. Intell. Conscious.},
  volume       = {9},
  number       = {1},
  pages        = {59--72},
  year         = {2022},
  url          = {https://doi.org/10.1142/s2705078521500193},
  doi          = {10.1142/S2705078521500193},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaic/Kak22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaic/Kak22a,
  author       = {Subhash C. Kak},
  title        = {Number of Autonomous Cognitive Agents in a Neural Network},
  journal      = {J. Artif. Intell. Conscious.},
  volume       = {9},
  number       = {2},
  pages        = {227--240},
  year         = {2022},
  url          = {https://doi.org/10.1142/s2705078522500023},
  doi          = {10.1142/S2705078522500023},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaic/Kak22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/Kak21,
  author       = {Subhash C. Kak},
  title        = {The Base-e Representation of Numbers and the Power Law},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {40},
  number       = {1},
  pages        = {490--500},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00034-020-01480-0},
  doi          = {10.1007/S00034-020-01480-0},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cssp/Kak21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/Kak21a,
  author       = {Subhash C. Kak},
  title        = {The Intrinsic Dimensionality of Data},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {40},
  number       = {5},
  pages        = {2599--2607},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00034-020-01583-8},
  doi          = {10.1007/S00034-020-01583-8},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssp/Kak21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/Kak21b,
  author       = {Subhash C. Kak},
  title        = {Fractals with Optimal Information Dimension},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {40},
  number       = {11},
  pages        = {5733--5743},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00034-021-01726-5},
  doi          = {10.1007/S00034-021-01726-5},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssp/Kak21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-04093,
  author       = {Subhash C. Kak},
  title        = {Reasoning in a Hierarchical System with Missing Group Size Information},
  journal      = {CoRR},
  volume       = {abs/1802.04093},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.04093},
  eprinttype    = {arXiv},
  eprint       = {1802.04093},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-04093.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-04994,
  author       = {Subhash C. Kak},
  title        = {On the Algebra in Boole's Laws of Thought},
  journal      = {CoRR},
  volume       = {abs/1803.04994},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.04994},
  eprinttype    = {arXiv},
  eprint       = {1803.04994},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-04994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-02759,
  author       = {Subhash C. Kak},
  title        = {Order Effects for Queries in Intelligent Systems},
  journal      = {CoRR},
  volume       = {abs/1804.02759},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.02759},
  eprinttype    = {arXiv},
  eprint       = {1804.02759},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-02759.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-06419,
  author       = {Subhash C. Kak},
  title        = {On Ternary Coding and Three-Valued Logic},
  journal      = {CoRR},
  volume       = {abs/1807.06419},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.06419},
  eprinttype    = {arXiv},
  eprint       = {1807.06419},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-06419.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Kak17,
  author       = {Subhash C. Kak},
  title        = {Power series models of self-similarity in social networks},
  journal      = {Inf. Sci.},
  volume       = {376},
  pages        = {31--38},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.10.010},
  doi          = {10.1016/J.INS.2016.10.010},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Kak17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acssc/BusireddygariK17,
  author       = {Prashanth Busireddygari and
                  Subhash C. Kak},
  editor       = {Michael B. Matthews},
  title        = {Authentication of parties in piggy bank cryptography},
  booktitle    = {51st Asilomar Conference on Signals, Systems, and Computers, {ACSSC}
                  2017, Pacific Grove, CA, USA, October 29 - November 1, 2017},
  pages        = {1389--1393},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACSSC.2017.8335582},
  doi          = {10.1109/ACSSC.2017.8335582},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/acssc/BusireddygariK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acssc/BusireddygariK17a,
  author       = {Prashanth Busireddygari and
                  Subhash C. Kak},
  editor       = {Michael B. Matthews},
  title        = {Pseudorandom tableau sequences},
  booktitle    = {51st Asilomar Conference on Signals, Systems, and Computers, {ACSSC}
                  2017, Pacific Grove, CA, USA, October 29 - November 1, 2017},
  pages        = {1733--1736},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACSSC.2017.8335657},
  doi          = {10.1109/ACSSC.2017.8335657},
  timestamp    = {Fri, 20 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acssc/BusireddygariK17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BusireddygariK17,
  author       = {Prashanth Busireddygari and
                  Subhash C. Kak},
  title        = {Binary primes sequence for cryptography and secure communication},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {570--574},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228686},
  doi          = {10.1109/CNS.2017.8228686},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BusireddygariK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/Kak17,
  author       = {Subhash C. Kak},
  title        = {Incomplete information and quantum decision trees},
  booktitle    = {2017 {IEEE} International Conference on Systems, Man, and Cybernetics,
                  {SMC} 2017, Banff, AB, Canada, October 5-8, 2017},
  pages        = {276--281},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SMC.2017.8122615},
  doi          = {10.1109/SMC.2017.8122615},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/Kak17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PrandlLPSK17,
  author       = {Stefan Prandl and
                  Mihai M. Lazarescu and
                  Duc{-}Son Pham and
                  Sieteng Soh and
                  Subhash C. Kak},
  title        = {An Investigation of Power Law Probability Distributions for Network
                  Anomaly Detection},
  booktitle    = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San
                  Jose, CA, USA, May 25, 2017},
  pages        = {217--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SPW.2017.20},
  doi          = {10.1109/SPW.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PrandlLPSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak17,
  author       = {Subhash C. Kak},
  title        = {The Absent-Minded Driver Problem Redux},
  journal      = {CoRR},
  volume       = {abs/1702.05778},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.05778},
  eprinttype    = {arXiv},
  eprint       = {1702.05778},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak17a,
  author       = {Subhash C. Kak},
  title        = {On Quantum Decision Trees},
  journal      = {CoRR},
  volume       = {abs/1703.03693},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.03693},
  eprinttype    = {arXiv},
  eprint       = {1703.03693},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BusireddygariK17,
  author       = {Prashanth Busireddygari and
                  Subhash C. Kak},
  title        = {Binary Prime Tableau Sequences},
  journal      = {CoRR},
  volume       = {abs/1704.08718},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.08718},
  eprinttype    = {arXiv},
  eprint       = {1704.08718},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BusireddygariK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak17aa,
  author       = {Subhash C. Kak},
  title        = {The Limits to Machine Consciousness},
  journal      = {CoRR},
  volume       = {abs/1707.06257},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.06257},
  eprinttype    = {arXiv},
  eprint       = {1707.06257},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak17aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-04029,
  author       = {Subhash C. Kak},
  title        = {Probability Reversal and the Disjunction Effect in Reasoning Systems},
  journal      = {CoRR},
  volume       = {abs/1709.04029},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.04029},
  eprinttype    = {arXiv},
  eprint       = {1709.04029},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-04029.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-04909,
  author       = {Subhash C. Kak},
  title        = {Reasoning in Systems with Elements that Randomly Switch Characteristics},
  journal      = {CoRR},
  volume       = {abs/1712.04909},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.04909},
  eprinttype    = {arXiv},
  eprint       = {1712.04909},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-04909.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-09331,
  author       = {Subhash C. Kak},
  title        = {Learning Based on {CC1} and {CC4} Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1712.09331},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.09331},
  eprinttype    = {arXiv},
  eprint       = {1712.09331},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-09331.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak16,
  author       = {Subhash C. Kak},
  title        = {Simulating entanglement in classical computing for cryptographic applications},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {348--354},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1084959},
  doi          = {10.1080/01611194.2015.1084959},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/Kak16,
  author       = {Subhash C. Kak},
  title        = {Generalized Unary Coding},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {35},
  number       = {4},
  pages        = {1419--1426},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00034-015-0120-7},
  doi          = {10.1007/S00034-015-0120-7},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssp/Kak16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KirthiK16,
  author       = {Krishnamurthy Kirthi and
                  Subhash C. Kak},
  title        = {The Narayana Universal Code},
  journal      = {CoRR},
  volume       = {abs/1601.07110},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.07110},
  eprinttype    = {arXiv},
  eprint       = {1601.07110},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KirthiK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ReddyK16,
  author       = {B. Prashanth Reddy and
                  Subhash C. Kak},
  title        = {The binary primes sequence for computational hardening of pseudorandom
                  sequences},
  journal      = {CoRR},
  volume       = {abs/1606.00410},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.00410},
  eprinttype    = {arXiv},
  eprint       = {1606.00410},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ReddyK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/Kak15,
  author       = {Subhash C. Kak},
  title        = {Orthogonal Residue Sequences},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {34},
  number       = {3},
  pages        = {1017--1025},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00034-014-9879-1},
  doi          = {10.1007/S00034-014-9879-1},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssp/Kak15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak15,
  author       = {Subhash C. Kak},
  title        = {Extended Unary Coding},
  journal      = {CoRR},
  volume       = {abs/1502.00894},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.00894},
  eprinttype    = {arXiv},
  eprint       = {1502.00894},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KirthiK15,
  author       = {Krishnamurthy Kirthi and
                  Subhash C. Kak},
  title        = {A Class of Random Sequences for Key Generation},
  journal      = {CoRR},
  volume       = {abs/1503.03821},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.03821},
  eprinttype    = {arXiv},
  eprint       = {1503.03821},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KirthiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChanRVKC15,
  author       = {Kam Wai Clifford Chan and
                  Mayssaa El Rifai and
                  Pramode K. Verma and
                  Subhash C. Kak and
                  Yuhua Chen},
  title        = {Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption},
  journal      = {CoRR},
  volume       = {abs/1503.05793},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.05793},
  eprinttype    = {arXiv},
  eprint       = {1503.05793},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChanRVKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak15a,
  author       = {Subhash C. Kak},
  title        = {Oblivious Transfer Protocol with Verification},
  journal      = {CoRR},
  volume       = {abs/1504.00601},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.00601},
  eprinttype    = {arXiv},
  eprint       = {1504.00601},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak15b,
  author       = {Subhash C. Kak},
  title        = {Multiparty Probability Computation and Verification},
  journal      = {CoRR},
  volume       = {abs/1505.05081},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.05081},
  eprinttype    = {arXiv},
  eprint       = {1505.05081},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SohLK15,
  author       = {Sieteng Soh and
                  Gongqi Lin and
                  Subhash C. Kak},
  title        = {Connectivity in Social Networks},
  journal      = {CoRR},
  volume       = {abs/1506.03377},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.03377},
  eprinttype    = {arXiv},
  eprint       = {1506.03377},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/SohLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak15c,
  author       = {Subhash C. Kak},
  title        = {Two Power Series Models of Self-Similarity in Social Networks},
  journal      = {CoRR},
  volume       = {abs/1506.07497},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.07497},
  eprinttype    = {arXiv},
  eprint       = {1506.07497},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KakP14,
  author       = {Subhash C. Kak and
                  Monisha Prabhu},
  title        = {Cryptographic Applications of Primitive Pythagorean Triples},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {215--222},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915257},
  doi          = {10.1080/01611194.2014.915257},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KakP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/Kak14,
  author       = {Subhash C. Kak},
  title        = {The Number Theoretic Hilbert Transform},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {33},
  number       = {8},
  pages        = {2539--2548},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00034-014-9759-8},
  doi          = {10.1007/S00034-014-9759-8},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssp/Kak14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JiCZK14,
  author       = {Shiyu Ji and
                  Tingting Chen and
                  Sheng Zhong and
                  Subhash C. Kak},
  title        = {{DAWN:} Defending against wormhole attacks in wireless network coding
                  systems},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {664--672},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6847992},
  doi          = {10.1109/INFOCOM.2014.6847992},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/JiCZK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/YuK14,
  author       = {Sheng Yu and
                  Subhash C. Kak},
  editor       = {Witold Pedrycz and
                  Shyi{-}Ming Chen},
  title        = {Social Network Dynamics: An Attention Economics Perspective},
  booktitle    = {Social Networks: {A} Framework of Computational Intelligence},
  series       = {Studies in Computational Intelligence},
  volume       = {526},
  pages        = {225--258},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-02993-1\_11},
  doi          = {10.1007/978-3-319-02993-1\_11},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/sci/YuK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak14,
  author       = {Subhash C. Kak},
  title        = {Efficiency of Matrix Multiplication on the Cross-Wired Mesh Array},
  journal      = {CoRR},
  volume       = {abs/1411.3273},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.3273},
  eprinttype    = {arXiv},
  eprint       = {1411.3273},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak14a,
  author       = {Subhash C. Kak},
  title        = {Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography},
  journal      = {CoRR},
  volume       = {abs/1411.3645},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.3645},
  eprinttype    = {arXiv},
  eprint       = {1411.3645},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak14b,
  author       = {Subhash C. Kak},
  title        = {Spread Unary Coding},
  journal      = {CoRR},
  volume       = {abs/1412.6122},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.6122},
  eprinttype    = {arXiv},
  eprint       = {1412.6122},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak14c,
  author       = {Subhash C. Kak},
  title        = {Friendship Paradox and Attention Economics},
  journal      = {CoRR},
  volume       = {abs/1412.7049},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.7049},
  eprinttype    = {arXiv},
  eprint       = {1412.7049},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak14c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChenKVMRP13,
  author       = {Yuhua Chen and
                  Subhash C. Kak and
                  Pramode K. Verma and
                  Gregory Macdonald and
                  Mayssaa El Rifai and
                  Nikhil Punekar},
  title        = {Multi-photon tolerant secure quantum communication - From theory to
                  practice},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {2111--2116},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6654838},
  doi          = {10.1109/ICC.2013.6654838},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ChenKVMRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/MandalMRPZCKVHS13,
  author       = {Sayonnha Mandal and
                  Gregory Macdonald and
                  Mayssaa El Rifai and
                  Nikhil Punekar and
                  Farnaz Zamani and
                  Yuhua Chen and
                  Subhash C. Kak and
                  Pramode K. Verma and
                  Robert C. Huck and
                  James J. Sluss Jr.},
  title        = {Multi-photon implementation of three-stage quantum cryptography protocol},
  booktitle    = {The International Conference on Information Networking 2013, {ICOIN}
                  2013, Bangkok, Thailand, January 28-30, 2013},
  pages        = {6--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICOIN.2013.6496343},
  doi          = {10.1109/ICOIN.2013.6496343},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/MandalMRPZCKVHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-0313,
  author       = {Subhash C. Kak},
  title        = {The Piggy Bank Cryptographic Trope},
  journal      = {CoRR},
  volume       = {abs/1301.0313},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.0313},
  eprinttype    = {arXiv},
  eprint       = {1301.0313},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-0313.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1304-4273,
  author       = {Gunjan Talati and
                  Subhash C. Kak},
  title        = {The Quartic Public Key Transformation},
  journal      = {CoRR},
  volume       = {abs/1304.4273},
  year         = {2013},
  url          = {http://arxiv.org/abs/1304.4273},
  eprinttype    = {arXiv},
  eprint       = {1304.4273},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1304-4273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1304-4651,
  author       = {Gunjan Talati and
                  Subhash C. Kak},
  title        = {Generalized Public Key Transformations with Side Information},
  journal      = {CoRR},
  volume       = {abs/1304.4651},
  year         = {2013},
  url          = {http://arxiv.org/abs/1304.4651},
  eprinttype    = {arXiv},
  eprint       = {1304.4651},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1304-4651.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1305-1900,
  author       = {Subhash C. Kak},
  title        = {Residue Classes of the {PPT} Sequence},
  journal      = {CoRR},
  volume       = {abs/1305.1900},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.1900},
  eprinttype    = {arXiv},
  eprint       = {1305.1900},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1305-1900.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/StoweK13,
  author       = {Matt Stowe and
                  Subhash C. Kak},
  title        = {Neural Network Capacity for Multilevel Inputs},
  journal      = {CoRR},
  volume       = {abs/1307.8104},
  year         = {2013},
  url          = {http://arxiv.org/abs/1307.8104},
  eprinttype    = {arXiv},
  eprint       = {1307.8104},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/StoweK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak13,
  author       = {Subhash C. Kak},
  title        = {The Number Theoretic Hilbert Transform},
  journal      = {CoRR},
  volume       = {abs/1308.1688},
  year         = {2013},
  url          = {http://arxiv.org/abs/1308.1688},
  eprinttype    = {arXiv},
  eprint       = {1308.1688},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak13a,
  author       = {Subhash C. Kak},
  title        = {Probability and the Classical/Quantum Divide},
  journal      = {CoRR},
  volume       = {abs/1309.2238},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.2238},
  eprinttype    = {arXiv},
  eprint       = {1309.2238},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak13b,
  author       = {Subhash C. Kak},
  title        = {Threshold Quantum Cryptography},
  journal      = {CoRR},
  volume       = {abs/1310.6333},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.6333},
  eprinttype    = {arXiv},
  eprint       = {1310.6333},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak13c,
  author       = {Subhash C. Kak},
  title        = {A Class of Orthogonal Sequences},
  journal      = {CoRR},
  volume       = {abs/1311.6821},
  year         = {2013},
  url          = {http://arxiv.org/abs/1311.6821},
  eprinttype    = {arXiv},
  eprint       = {1311.6821},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak13d,
  author       = {Subhash C. Kak},
  title        = {A Key Set Cipher for Wireless Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1312.2539},
  year         = {2013},
  url          = {http://arxiv.org/abs/1312.2539},
  eprinttype    = {arXiv},
  eprint       = {1312.2539},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgct/YuK12,
  author       = {Sheng Yu and
                  Subhash C. Kak},
  title        = {An empirical study of how users adopt famous entities},
  booktitle    = {First International Conference on Future Generation Communication
                  Technologies {(FGST} 2012), London, United Kingdom, December 12-14,
                  2012},
  pages        = {64--69},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/FGCT.2012.6476555},
  doi          = {10.1109/FGCT.2012.6476555},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgct/YuK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/Chan-TinCK12,
  author       = {Grajzer Chan{-}Tin and
                  Tingting Chen and
                  Subhash C. Kak},
  title        = {A Comprehensive Security Model for Networking Applications},
  booktitle    = {21st International Conference on Computer Communications and Networks,
                  {ICCCN} 2012, Munich, Germany, July 30 - August 2, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICCCN.2012.6289238},
  doi          = {10.1109/ICCCN.2012.6289238},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/Chan-TinCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1202-0200,
  author       = {Sindhu Chitikela and
                  Subhash C. Kak},
  title        = {Increasing Randomness Using Permutations on Blocks},
  journal      = {CoRR},
  volume       = {abs/1202.0200},
  year         = {2012},
  url          = {http://arxiv.org/abs/1202.0200},
  eprinttype    = {arXiv},
  eprint       = {1202.0200},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1202-0200.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-1647,
  author       = {Sheng Yu and
                  Subhash C. Kak},
  title        = {A Survey of Prediction Using Social Media},
  journal      = {CoRR},
  volume       = {abs/1203.1647},
  year         = {2012},
  url          = {http://arxiv.org/abs/1203.1647},
  eprinttype    = {arXiv},
  eprint       = {1203.1647},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1203-1647.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1206-6778,
  author       = {Subhash C. Kak and
                  Yuhua Chen and
                  Pramode K. Verma},
  title        = {iAQC: The Intensity-Aware Quantum Cryptography Protocol},
  journal      = {CoRR},
  volume       = {abs/1206.6778},
  year         = {2012},
  url          = {http://arxiv.org/abs/1206.6778},
  eprinttype    = {arXiv},
  eprint       = {1206.6778},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1206-6778.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-6307,
  author       = {Krishnama Raju Kanchu and
                  Subhash C. Kak},
  title        = {On Randomness of Goldbach Sequences},
  journal      = {CoRR},
  volume       = {abs/1207.6307},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.6307},
  eprinttype    = {arXiv},
  eprint       = {1207.6307},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-6307.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-1984,
  author       = {Krishnama Raju Kanchu and
                  Subhash C. Kak},
  title        = {Goldbach Ellipse Sequences for Cryptographic Applications},
  journal      = {CoRR},
  volume       = {abs/1208.1984},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.1984},
  eprinttype    = {arXiv},
  eprint       = {1208.1984},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-1984.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-6198,
  author       = {Sayonnha Mandal and
                  Gregory Macdonald and
                  Mayssaa El Rifai and
                  Nikhil Punekar and
                  Farnaz Zamani and
                  Yuhua Chen and
                  Subhash C. Kak and
                  Pramode K. Verma and
                  Robert C. Huck and
                  James J. Sluss Jr.},
  title        = {Implementation of Secure Quantum Protocol using Multiple Photons for
                  Communication},
  journal      = {CoRR},
  volume       = {abs/1208.6198},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.6198},
  eprinttype    = {arXiv},
  eprint       = {1208.6198},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-6198.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-0135,
  author       = {Deepthi Cherlopalle and
                  Subhash C. Kak},
  title        = {Goldbach Triples and Key Distribution},
  journal      = {CoRR},
  volume       = {abs/1209.0135},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.0135},
  eprinttype    = {arXiv},
  eprint       = {1209.0135},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-0135.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-1323,
  author       = {Sheng Yu and
                  Subhash C. Kak},
  title        = {An Empirical Study of How Users Adopt Famous Entities},
  journal      = {CoRR},
  volume       = {abs/1209.1323},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.1323},
  eprinttype    = {arXiv},
  eprint       = {1209.1323},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-1323.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-4621,
  author       = {Krishnama Raju Kanchu and
                  Subhash C. Kak},
  title        = {Goldbach Circles and Balloons and Their Cross Correlation},
  journal      = {CoRR},
  volume       = {abs/1209.4621},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.4621},
  eprinttype    = {arXiv},
  eprint       = {1209.4621},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-4621.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-4614,
  author       = {Subhash C. Kak},
  title        = {Random Sequences Based on the Divisor Pairs Function},
  journal      = {CoRR},
  volume       = {abs/1210.4614},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.4614},
  eprinttype    = {arXiv},
  eprint       = {1210.4614},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-4614.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-8398,
  author       = {Sandeep Hosangadi and
                  Subhash C. Kak},
  title        = {An Alignment Algorithm for Sequences},
  journal      = {CoRR},
  volume       = {abs/1210.8398},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.8398},
  eprinttype    = {arXiv},
  eprint       = {1210.8398},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-8398.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-2751,
  author       = {Monisha Prabhu and
                  Subhash C. Kak},
  title        = {Random Sequences from Primitive Pythagorean Triples},
  journal      = {CoRR},
  volume       = {abs/1211.2751},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.2751},
  eprinttype    = {arXiv},
  eprint       = {1211.2751},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-2751.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ParakhK11,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Space efficient secret sharing for implicit data security},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {2},
  pages        = {335--341},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2010.09.013},
  doi          = {10.1016/J.INS.2010.09.013},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ParakhK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/ParakhK11,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Matrix based key agreement algorithms for sensor networks},
  booktitle    = {Fifth {IEEE} International Conference on Advanced Telecommunication
                  Systems and Networks, {ANTS} 2011, December 18-21, 2011 Bengaluru,
                  India},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ANTS.2011.6163684},
  doi          = {10.1109/ANTS.2011.6163684},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEants/ParakhK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adcons/ParakhK11,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  editor       = {P. Santhi Thilagam and
                  Alwyn Roshan Pais and
                  K. Chandrasekaran and
                  N. Balakrishnan},
  title        = {A New Small World Lattice},
  booktitle    = {Advanced Computing, Networking and Security - International Conference,
                  {ADCONS} 2011, Surathkal, India, December 16-18, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7135},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29280-4\_1},
  doi          = {10.1007/978-3-642-29280-4\_1},
  timestamp    = {Mon, 29 Jun 2020 13:10:10 +0200},
  biburl       = {https://dblp.org/rec/conf/adcons/ParakhK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/GundaCCK11,
  author       = {Raviteja Gunda and
                  Joe Cecil and
                  Prasad Calyam and
                  Subhash C. Kak},
  editor       = {Robert Meersman and
                  Tharam S. Dillon and
                  Pilar Herrero},
  title        = {Information Centric Frameworks for Micro Assembly},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2011 Workshops -
                  Confederated International Workshops and Posters: {EI2N+NSF} ICE,
                  ICSP+INBAST, ISDE, ORM, OTMA, SWWS+MONET+SeDeS, and {VADER} 2011,
                  Hersonissos, Crete, Greece, October 17-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7046},
  pages        = {93--101},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25126-9\_17},
  doi          = {10.1007/978-3-642-25126-9\_17},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/otm/GundaCCK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-4573,
  author       = {Subhash C. Kak},
  title        = {The Algebra of Two Dimensional Patterns},
  journal      = {CoRR},
  volume       = {abs/1102.4573},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.4573},
  eprinttype    = {arXiv},
  eprint       = {1102.4573},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-4573.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ParakhK10,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Internet Voting Protocol Based on Improved Implicit Security},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {3},
  pages        = {258--268},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.485421},
  doi          = {10.1080/01611194.2010.485421},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ParakhK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iim/ChenKW10,
  author       = {Yuhua Chen and
                  Subhash C. Kak and
                  Lei Wang},
  title        = {Hybrid Neural Network Architecture for On-Line Learning},
  journal      = {Intell. Inf. Manag.},
  volume       = {2},
  number       = {4},
  pages        = {253--261},
  year         = {2010},
  url          = {https://doi.org/10.4236/iim.2010.23030},
  doi          = {10.4236/IIM.2010.23030},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iim/ChenKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/KakCW10,
  author       = {Subhash C. Kak and
                  Yuhua Chen and
                  Lei Wang},
  editor       = {Martin Santana and
                  Jerry N. Luftman and
                  Ajay S. Vinze},
  title        = {Data Mining Using Surface and Deep Agents Based on Neural Networks},
  booktitle    = {Sustainable {IT} Collaboration Around the Globe. 16th Americas Conference
                  on Information Systems, {AMCIS} 2010, Lima, Peru, August 12-15, 2010},
  pages        = {16},
  publisher    = {Association for Information Systems},
  year         = {2010},
  url          = {http://aisel.aisnet.org/amcis2010/16},
  timestamp    = {Mon, 05 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/KakCW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ParakhK10,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {A Tree Based Recursive Information Hiding Scheme},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502430},
  doi          = {10.1109/ICC.2010.5502430},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ParakhK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-1711,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Internet voting protocol based on implicit data security},
  journal      = {CoRR},
  volume       = {abs/1001.1711},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.1711},
  eprinttype    = {arXiv},
  eprint       = {1001.1711},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-1711.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-1936,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {A Key Distribution Scheme for Sensor Networks Using Structured Graphs},
  journal      = {CoRR},
  volume       = {abs/1001.1936},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.1936},
  eprinttype    = {arXiv},
  eprint       = {1001.1936},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-1936.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-2326,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {A Distributed Data Storage Scheme for Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1001.2326},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.2326},
  eprinttype    = {arXiv},
  eprint       = {1001.2326},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-2326.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-3331,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Recursive Secret Sharing for Distributed Storage and Information Hiding},
  journal      = {CoRR},
  volume       = {abs/1001.3331},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.3331},
  eprinttype    = {arXiv},
  eprint       = {1001.3331},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-3331.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1002-3409,
  author       = {Subhash C. Kak},
  title        = {Aryabhata's Mathematics},
  journal      = {CoRR},
  volume       = {abs/1002.3409},
  year         = {2010},
  url          = {http://arxiv.org/abs/1002.3409},
  eprinttype    = {arXiv},
  eprint       = {1002.3409},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1002-3409.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-3770,
  author       = {Subhash C. Kak},
  title        = {Pythagorean Triples and Cryptographic Coding},
  journal      = {CoRR},
  volume       = {abs/1004.3770},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.3770},
  eprinttype    = {arXiv},
  eprint       = {1004.3770},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-3770.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1009-4495,
  author       = {Subhash C. Kak},
  title        = {Unary Coding for Neural Network Learning},
  journal      = {CoRR},
  volume       = {abs/1009.4495},
  year         = {2010},
  url          = {http://arxiv.org/abs/1009.4495},
  eprinttype    = {arXiv},
  eprint       = {1009.4495},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1009-4495.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1010-5421,
  author       = {Subhash C. Kak},
  title        = {On the Mesh Array for Matrix Multiplication},
  journal      = {CoRR},
  volume       = {abs/1010.5421},
  year         = {2010},
  url          = {http://arxiv.org/abs/1010.5421},
  eprinttype    = {arXiv},
  eprint       = {1010.5421},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1010-5421.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1011-4093,
  author       = {Praveen Kuruvada and
                  Daniel Asamoah and
                  Nikunj Dalal and
                  Subhash C. Kak},
  title        = {The Use of Rapid Digital Game Creation to Learn Computational Thinking},
  journal      = {CoRR},
  volume       = {abs/1011.4093},
  year         = {2010},
  url          = {http://arxiv.org/abs/1011.4093},
  eprinttype    = {arXiv},
  eprint       = {1011.4093},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1011-4093.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijshc/DalalDKAS09,
  author       = {Nikunj Dalal and
                  Parth Dalal and
                  Subhash C. Kak and
                  Pavlo D. Antonenko and
                  Susan Stansberry},
  title        = {Rapid digital game creation for broadening participation in computing
                  and fostering crucial thinking skills},
  journal      = {Int. J. Soc. Humanist. Comput.},
  volume       = {1},
  number       = {2},
  pages        = {123--137},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSHC.2009.031002},
  doi          = {10.1504/IJSHC.2009.031002},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijshc/DalalDKAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ParakhK09,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Online data storage using implicit security},
  journal      = {Inf. Sci.},
  volume       = {179},
  number       = {19},
  pages        = {3323--3331},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ins.2009.05.013},
  doi          = {10.1016/J.INS.2009.05.013},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ParakhK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenVK09,
  author       = {Yuhua Chen and
                  Pramode K. Verma and
                  Subhash C. Kak},
  title        = {Embedded security framework for integrated classical and quantum cryptography
                  services in optical burst switching networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {6},
  pages        = {546--554},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.98},
  doi          = {10.1002/SEC.98},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenVK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbc/SattiK09,
  author       = {Maruti Satti and
                  Subhash C. Kak},
  title        = {Multilevel Indexed Quasigroup Encryption for Data and Speech},
  journal      = {{IEEE} Trans. Broadcast.},
  volume       = {55},
  number       = {2},
  pages        = {270--281},
  year         = {2009},
  url          = {https://doi.org/10.1109/TBC.2009.2014993},
  doi          = {10.1109/TBC.2009.2014993},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbc/SattiK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csedu/DalalDK09,
  author       = {Parth Dalal and
                  Nikunj Dalal and
                  Subhash C. Kak},
  editor       = {Jos{\'{e}} A. Moinhos Cordeiro and
                  Boris Shishkov and
                  Alexander Verbraeck and
                  Markus Helfert},
  title        = {Learning Computer Programming with Game Design},
  booktitle    = {{CSEDU} 2009 - Proceedings of the First International Conference on
                  Computer Supported Education, Lisboa, Portugal, March 23-26, 2009
                  - Volume 2},
  pages        = {135--138},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Mon, 05 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csedu/DalalDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec/ParakhK09,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  editor       = {Andreas U. Schmidt and
                  Shiguo Lian},
  title        = {A Distributed Data Storage Scheme for Sensor Networks},
  booktitle    = {Security and Privacy in Mobile Information and Communication Systems,
                  First International {ICST} Conference, MobiSec 2009, Turin, Italy,
                  June 3-5, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {17},
  pages        = {14--22},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04434-2\_2},
  doi          = {10.1007/978-3-642-04434-2\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec/ParakhK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ParakhK09,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Space Efficient Secret Sharing},
  journal      = {CoRR},
  volume       = {abs/0901.4798},
  year         = {2009},
  url          = {http://arxiv.org/abs/0901.4798},
  eprinttype    = {arXiv},
  eprint       = {0901.4798},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ParakhK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ParakhK09a,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Space Efficient Secret Sharing: {A} Recursive Approach},
  journal      = {CoRR},
  volume       = {abs/0901.4814},
  year         = {2009},
  url          = {http://arxiv.org/abs/0901.4814},
  eprinttype    = {arXiv},
  eprint       = {0901.4814},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ParakhK09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0902-2487,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {A Recursive Threshold Visual Cryptography Scheme},
  journal      = {CoRR},
  volume       = {abs/0902.2487},
  year         = {2009},
  url          = {http://arxiv.org/abs/0902.2487},
  eprinttype    = {arXiv},
  eprint       = {0902.2487},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0902-2487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0905-2977,
  author       = {Subhash C. Kak},
  title        = {Cryptography for Multi-Located Parties},
  journal      = {CoRR},
  volume       = {abs/0905.2977},
  year         = {2009},
  url          = {http://arxiv.org/abs/0905.2977},
  eprinttype    = {arXiv},
  eprint       = {0905.2977},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0905-2977.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0905-3771,
  author       = {Subhash C. Kak},
  title        = {Memory Retrieved from Single Neurons},
  journal      = {CoRR},
  volume       = {abs/0905.3771},
  year         = {2009},
  url          = {http://arxiv.org/abs/0905.3771},
  eprinttype    = {arXiv},
  eprint       = {0905.3771},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0905-3771.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0906-0798,
  author       = {Subhash C. Kak},
  title        = {Single Neuron Memories and the Network's Proximity Matrix},
  journal      = {CoRR},
  volume       = {abs/0906.0798},
  year         = {2009},
  url          = {http://arxiv.org/abs/0906.0798},
  eprinttype    = {arXiv},
  eprint       = {0906.0798},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0906-0798.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak09,
  author       = {Subhash C. Kak},
  title        = {The Transactional Nature of Quantum Information},
  journal      = {CoRR},
  volume       = {abs/0907.2465},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.2465},
  eprinttype    = {arXiv},
  eprint       = {0907.2465},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-5226,
  author       = {Subhash C. Kak},
  title        = {Recursive Random Number Generator Using Prime Reciprocals},
  journal      = {CoRR},
  volume       = {abs/0907.5226},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.5226},
  eprinttype    = {arXiv},
  eprint       = {0907.5226},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-5226.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0908-3148,
  author       = {Subhash C. Kak},
  title        = {Another Look at Quantum Neural Computing},
  journal      = {CoRR},
  volume       = {abs/0908.3148},
  year         = {2009},
  url          = {http://arxiv.org/abs/0908.3148},
  eprinttype    = {arXiv},
  eprint       = {0908.3148},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0908-3148.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParakhK09,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Space Efficient Secret Sharing: {A} Recursive Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParakhK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParakhK09a,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {A Tree Based Recursive Scheme for Space Efficient Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParakhK09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ParakhK08,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Internet Voting Protocol Based on Implicit Data Security},
  booktitle    = {Proceedings of the 17th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2008, St. Thomas, {U.S.} Virgin Islands,
                  August 3-7, 2008},
  pages        = {743--746},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICCCN.2008.ECP.140},
  doi          = {10.1109/ICCCN.2008.ECP.140},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/ParakhK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0801-1336,
  author       = {Subhash C. Kak},
  title        = {Stream Computing},
  journal      = {CoRR},
  volume       = {abs/0801.1336},
  year         = {2008},
  url          = {http://arxiv.org/abs/0801.1336},
  eprinttype    = {arXiv},
  eprint       = {0801.1336},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0801-1336.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0809-5087,
  author       = {Yuhua Chen and
                  Subhash C. Kak and
                  Lei Wang},
  title        = {Hybrid Neural Network Architecture for On-Line Learning},
  journal      = {CoRR},
  volume       = {abs/0809.5087},
  year         = {2008},
  url          = {http://arxiv.org/abs/0809.5087},
  eprinttype    = {arXiv},
  eprint       = {0809.5087},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0809-5087.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParakhK08,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {A Recursive Threshold Visual Cryptography Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParakhK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbc/ParthasarathyK07,
  author       = {Arvind Kumar Parthasarathy and
                  Subhash C. Kak},
  title        = {An Improved Method of Content Based Image Watermarking},
  journal      = {{IEEE} Trans. Broadcast.},
  volume       = {53},
  number       = {2},
  pages        = {468--479},
  year         = {2007},
  url          = {https://doi.org/10.1109/TBC.2007.894947},
  doi          = {10.1109/TBC.2007.894947},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbc/ParthasarathyK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ubiquity/ParakhK07,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {How to improve security in electronic voting?},
  journal      = {Ubiquity},
  volume       = {2007},
  number       = {February},
  pages        = {2:1--2:7},
  year         = {2007},
  url          = {http://doi.acm.org/10.1145/1238607.1238608},
  doi          = {10.1145/1238607.1238608},
  timestamp    = {Sun, 08 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ubiquity/ParakhK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/PenumarthiK06,
  author       = {Kiranmayi Penumarthi and
                  Subhash C. Kak},
  title        = {Augmented Watermarking},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {2},
  pages        = {173--180},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500541824},
  doi          = {10.1080/01611190500541824},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/PenumarthiK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ubiquity/KakDD06,
  author       = {Subhash C. Kak and
                  C. Donald and
                  Elaine T. Delaune},
  title        = {On the realizability of quantum computers},
  journal      = {Ubiquity},
  volume       = {2006},
  number       = {March},
  pages        = {3:1},
  year         = {2006},
  url          = {http://doi.acm.org/10.1145/1125359.1125360},
  doi          = {10.1145/1125359.1125360},
  timestamp    = {Mon, 09 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ubiquity/KakDD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0601052,
  author       = {Subhash C. Kak},
  title        = {Artificial and Biological Intelligence},
  journal      = {CoRR},
  volume       = {abs/cs/0601052},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0601052},
  eprinttype    = {arXiv},
  eprint       = {cs/0601052},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0601052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0602003,
  author       = {Navneet Mandhani and
                  Subhash C. Kak},
  title        = {Watermarking Using Decimal Sequences},
  journal      = {CoRR},
  volume       = {abs/cs/0602003},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0602003},
  eprinttype    = {arXiv},
  eprint       = {cs/0602003},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0602003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0602097,
  author       = {Subhash C. Kak},
  title        = {The Cubic Public-Key Transformation},
  journal      = {CoRR},
  volume       = {abs/cs/0602097},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0602097},
  eprinttype    = {arXiv},
  eprint       = {cs/0602097},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0602097.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak06,
  author       = {Subhash C. Kak},
  title        = {Quantum Information and Entropy},
  journal      = {CoRR},
  volume       = {abs/quant-ph/0605096},
  year         = {2006},
  url          = {http://arxiv.org/abs/quant-ph/0605096},
  eprinttype    = {arXiv},
  eprint       = {quant-ph/0605096},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MandhaniK05,
  author       = {Navneet Mandhani and
                  Subhash C. Kak},
  title        = {Watermarking Using Decimal Sequences},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {50--58},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893762},
  doi          = {10.1080/0161-110591893762},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MandhaniK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ubiquity/KakDD05,
  author       = {Subhash C. Kak and
                  C. Donald and
                  Elaine T. Delaune},
  title        = {Artificial and Biological Intelligence},
  journal      = {Ubiquity},
  volume       = {2005},
  number       = {November},
  pages        = {1},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1103046.1103047},
  doi          = {10.1145/1103046.1103047},
  timestamp    = {Tue, 10 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ubiquity/KakDD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kak05,
  author       = {Subhash C. Kak},
  title        = {A Three-Stage Quantum Cryptography Protocol},
  journal      = {CoRR},
  volume       = {abs/quant-ph/0503027},
  year         = {2005},
  url          = {http://arxiv.org/abs/quant-ph/0503027},
  eprinttype    = {arXiv},
  eprint       = {quant-ph/0503027},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kak05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Kak03,
  author       = {Subhash C. Kak},
  title        = {General qubit errors cannot be corrected},
  journal      = {Inf. Sci.},
  volume       = {152},
  pages        = {195--202},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0020-0255(02)00410-3},
  doi          = {10.1016/S0020-0255(02)00410-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Kak03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GnanaguruparanK02,
  author       = {Meenakshi Gnanaguruparan and
                  Subhash C. Kak},
  title        = {Recursive Hiding of Secrets in Visual Cryptography},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {1},
  pages        = {68--76},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890768},
  doi          = {10.1080/0161-110291890768},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GnanaguruparanK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Kak02,
  author       = {Subhash C. Kak},
  title        = {A class of instantaneously trained neural networks},
  journal      = {Inf. Sci.},
  volume       = {148},
  number       = {1-4},
  pages        = {97--102},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0020-0255(02)00281-5},
  doi          = {10.1016/S0020-0255(02)00281-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Kak02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jcis/Kak02,
  author       = {Subhash C. Kak},
  editor       = {H. John Caulfield and
                  Shu{-}Heng Chen and
                  Heng{-}Da Cheng and
                  Richard J. Duro and
                  Vasant G. Honavar and
                  Etienne E. Kerre and
                  Mi Lu and
                  Manuel Gra{\~{n}}a Romay and
                  Timothy K. Shih and
                  Dan Ventura and
                  Paul P. Wang and
                  Yuanyuan Yang},
  title        = {A Class of Instantaneously Trained Neural Networks},
  booktitle    = {Proceedings of the 6th Joint Conference on Information Science, March
                  8-13, 2002, Research Triangle Park, North Carolina, {USA}},
  pages        = {19--22},
  publisher    = {{JCIS} / Association for Intelligent Machinery, Inc.},
  year         = {2002},
  timestamp    = {Mon, 13 Nov 2017 18:15:11 +0100},
  biburl       = {https://dblp.org/rec/conf/jcis/Kak02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Kak00,
  author       = {Subhash C. Kak},
  title        = {Active agents, intelligence and quantum computing},
  journal      = {Inf. Sci.},
  volume       = {128},
  number       = {1-2},
  pages        = {1--17},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0020-0255(00)00043-8},
  doi          = {10.1016/S0020-0255(00)00043-8},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/Kak00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/VenturaK00,
  author       = {Dan Ventura and
                  Subhash C. Kak},
  title        = {Quantum computing and neural information processing},
  journal      = {Inf. Sci.},
  volume       = {128},
  number       = {3-4},
  pages        = {147--148},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0020-0255(00)00049-9},
  doi          = {10.1016/S0020-0255(00)00049-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/VenturaK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Kak00a,
  author       = {Subhash C. Kak},
  title        = {Rotating a qubit},
  journal      = {Inf. Sci.},
  volume       = {128},
  number       = {3-4},
  pages        = {149--154},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0020-0255(00)00050-5},
  doi          = {10.1016/S0020-0255(00)00050-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Kak00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/TejomurtulaK99,
  author       = {Sreenivas Tejomurtula and
                  Subhash C. Kak},
  title        = {Inverse Kinematics in Robotics using Neural Networks},
  journal      = {Inf. Sci.},
  volume       = {116},
  number       = {2-4},
  pages        = {147--164},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0255(98)10098-1},
  doi          = {10.1016/S0020-0255(98)10098-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/TejomurtulaK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShuK99,
  author       = {Bo Shu and
                  Subhash C. Kak},
  title        = {A Neural Network-based Intelligent Metasearch Engine},
  journal      = {Inf. Sci.},
  volume       = {120},
  number       = {1-4},
  pages        = {1--11},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0255(99)00062-6},
  doi          = {10.1016/S0020-0255(99)00062-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ShuK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Kak98,
  author       = {Subhash C. Kak},
  title        = {On Generalization by Neural Networks},
  journal      = {Inf. Sci.},
  volume       = {111},
  number       = {1-4},
  pages        = {293--302},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0255(98)10009-9},
  doi          = {10.1016/S0020-0255(98)10009-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Kak98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak96,
  author       = {Subhash C. Kak},
  title        = {An Indus-Sarasvat{\={\i}} Signboard},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {3},
  pages        = {275--279},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884960},
  doi          = {10.1080/0161-119691884960},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Kak95,
  author       = {Subhash C. Kak},
  title        = {On Quantum Neural Computing},
  journal      = {Inf. Sci.},
  volume       = {83},
  number       = {3{\&}4},
  pages        = {143--160},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0255(94)00095-S},
  doi          = {10.1016/0020-0255(94)00095-S},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Kak95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/Kak94,
  author       = {Subhash C. Kak},
  title        = {New algorithms for training feedforward neural networks},
  journal      = {Pattern Recognit. Lett.},
  volume       = {15},
  number       = {3},
  pages        = {295--298},
  year         = {1994},
  url          = {https://doi.org/10.1016/0167-8655(94)90062-0},
  doi          = {10.1016/0167-8655(94)90062-0},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/Kak94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Kak93,
  author       = {Subhash C. Kak},
  title        = {Neural networks and artificial intelligence},
  journal      = {Inf. Sci.},
  volume       = {70},
  number       = {1-2},
  pages        = {1--3},
  year         = {1993},
  url          = {https://doi.org/10.1016/0020-0255(93)90045-N},
  doi          = {10.1016/0020-0255(93)90045-N},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Kak93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak90,
  author       = {Subhash C. Kak},
  title        = {The Vararuchi Cipher},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {1},
  pages        = {79--82},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864797},
  doi          = {10.1080/0161-119091864797},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak90a,
  author       = {Subhash C. Kak},
  title        = {Indus and Brahmi Further Connections},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {2},
  pages        = {169--183},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864878},
  doi          = {10.1080/0161-119091864878},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictai/Kak90,
  author       = {Subhash C. Kak},
  title        = {Neural computing with structured information},
  booktitle    = {Proceedings of the 2nd International {IEEE} Conference on Tools for
                  Artificial Intelligence, {TAI} 1990, Herndon, VA, USA, November 6-9,
                  1990},
  pages        = {359--365},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/TAI.1990.130363},
  doi          = {10.1109/TAI.1990.130363},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictai/Kak90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak89,
  author       = {Subhash C. Kak},
  title        = {A New Method for Coin Flipping by Telephone},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {1},
  pages        = {73--78},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863781},
  doi          = {10.1080/0161-118991863781},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak88,
  author       = {Subhash C. Kak},
  title        = {The Aryabhata Cipher},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {2},
  pages        = {113--117},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862855},
  doi          = {10.1080/0161-118891862855},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak88a,
  author       = {Subhash C. Kak},
  title        = {A frequency Analysis of the Indus Script},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {3},
  pages        = {129--143},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862873},
  doi          = {10.1080/0161-118891862873},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Kak88,
  author       = {Subhash C. Kak},
  title        = {Multilayered array computing},
  journal      = {Inf. Sci.},
  volume       = {45},
  number       = {3},
  pages        = {347--365},
  year         = {1988},
  url          = {https://doi.org/10.1016/0020-0255(88)90010-2},
  doi          = {10.1016/0020-0255(88)90010-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Kak88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pc/Kak88,
  author       = {Subhash C. Kak},
  title        = {A two-layered mesh array for matrix multiplication},
  journal      = {Parallel Comput.},
  volume       = {6},
  number       = {3},
  pages        = {383--385},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-8191(88)90078-6},
  doi          = {10.1016/0167-8191(88)90078-6},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pc/Kak88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak87,
  author       = {Subhash C. Kak},
  title        = {The Study of the Indus Script General Considerations},
  journal      = {Cryptologia},
  volume       = {11},
  number       = {3},
  pages        = {182--191},
  year         = {1987},
  url          = {https://doi.org/10.1080/0161-118791862009},
  doi          = {10.1080/0161-118791862009},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijar/Kak87,
  author       = {Subhash C. Kak},
  title        = {The Paninian approach to natural language processing},
  journal      = {Int. J. Approx. Reason.},
  volume       = {1},
  number       = {1},
  pages        = {117--130},
  year         = {1987},
  url          = {https://doi.org/10.1016/0888-613X(87)90007-7},
  doi          = {10.1016/0888-613X(87)90007-7},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijar/Kak87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Kak85,
  author       = {Subhash C. Kak},
  title        = {How to Detect Tampering of Data},
  journal      = {Inf. Process. Lett.},
  volume       = {20},
  number       = {2},
  pages        = {109--110},
  year         = {1985},
  url          = {https://doi.org/10.1016/0020-0190(85)90074-2},
  doi          = {10.1016/0020-0190(85)90074-2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Kak85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Kak85,
  author       = {Subhash C. Kak},
  title        = {Encryption and Error-Correction Coding Using \emph{D} Sequences},
  journal      = {{IEEE} Trans. Computers},
  volume       = {34},
  number       = {9},
  pages        = {803--809},
  year         = {1985},
  url          = {https://doi.org/10.1109/TC.1985.1676636},
  doi          = {10.1109/TC.1985.1676636},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Kak85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/Kak84,
  author       = {Subhash C. Kak},
  title        = {On the method of puzzles for key distribution},
  journal      = {Int. J. Parallel Program.},
  volume       = {13},
  number       = {2},
  pages        = {103--109},
  year         = {1984},
  url          = {https://doi.org/10.1007/BF00978711},
  doi          = {10.1007/BF00978711},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpp/Kak84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Kak83,
  author       = {Subhash C. Kak},
  title        = {Data Security in Computer Networks: Guest Editor's Introduction},
  journal      = {Computer},
  volume       = {16},
  number       = {2},
  pages        = {8--10},
  year         = {1983},
  url          = {https://doi.org/10.1109/MC.1983.1654293},
  doi          = {10.1109/MC.1983.1654293},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Kak83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/Kak83,
  author       = {Subhash C. Kak},
  title        = {Exponentiation modulo a polynomial for data security},
  journal      = {Int. J. Parallel Program.},
  volume       = {12},
  number       = {5},
  pages        = {337--346},
  year         = {1983},
  url          = {https://doi.org/10.1007/BF01008045},
  doi          = {10.1007/BF01008045},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpp/Kak83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Kak83,
  author       = {Subhash C. Kak},
  title        = {A Structural Redundancy in \emph{d}-Sequences},
  journal      = {{IEEE} Trans. Computers},
  volume       = {32},
  number       = {11},
  pages        = {1069--1071},
  year         = {1983},
  url          = {https://doi.org/10.1109/TC.1983.1676160},
  doi          = {10.1109/TC.1983.1676160},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Kak83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Kak83,
  author       = {Subhash C. Kak},
  title        = {Joint Encryption and Error-Correction Coding},
  booktitle    = {Proceedings of the 1983 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 25-27, 1983},
  pages        = {55--60},
  publisher    = {{IEEE} Computer Society},
  year         = {1983},
  url          = {https://doi.org/10.1109/SP.1983.10017},
  doi          = {10.1109/SP.1983.10017},
  timestamp    = {Thu, 21 Sep 2023 15:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Kak83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KakC81,
  author       = {Subhash C. Kak and
                  Amitava Chatterjee},
  title        = {On decimal sequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {27},
  number       = {5},
  pages        = {647},
  year         = {1981},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KakC81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kak81,
  author       = {Subhash C. Kak},
  editor       = {Allen Gersho},
  title        = {Scrambling and Randomization},
  booktitle    = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE}
                  Workshop on Communications Security, Santa Barbara, California, USA,
                  August 24-26, 1981},
  pages        = {59--63},
  publisher    = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report
                  No 82-04},
  year         = {1981},
  timestamp    = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Kak81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/Kak74,
  author       = {Subhash C. Kak},
  title        = {Binary Sequences and Redundancy},
  journal      = {{IEEE} Trans. Syst. Man Cybern.},
  volume       = {4},
  number       = {4},
  pages        = {399--401},
  year         = {1974},
  url          = {https://doi.org/10.1109/TSMC.1974.5408465},
  doi          = {10.1109/TSMC.1974.5408465},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/Kak74.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics