


Остановите войну!
for scientists:
K. Srinathan
Kannan Srinathan
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [i16]Achintya Desai, Shubham Raj, Kannan Srinathan:
Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary. IACR Cryptol. ePrint Arch. 2020: 1337 (2020)
2010 – 2019
- 2019
- [j16]Saurav Malani, Jangirala Srinivas, Ashok Kumar Das
, Kannan Srinathan, Minho Jo
:
Certificate-Based Anonymous Device Access Control Scheme for IoT Environment. IEEE Internet Things J. 6(6): 9762-9773 (2019) - [c92]Ravi Kishore, Anupriya Inumella, Kannan Srinathan:
Perfectly secure message transmission over partially synchronous networks. ICDCN 2019: 302-306 - 2018
- [j15]Ravi Kishore, Chiranjeevi Vanarasa, Kannan Srinathan:
On minimal connectivity requirements for secure message transmission in directed networks. Inf. Process. Lett. 131: 1-6 (2018) - [j14]Ravi Kishore
, Ashutosh Kumar
, Chiranjeevi Vanarasa, Kannan Srinathan:
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission. IEEE Trans. Inf. Theory 64(2): 1404-1422 (2018) - [i15]Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan:
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission. IACR Cryptol. ePrint Arch. 2018: 1167 (2018) - 2017
- [c91]Mallipeddi Hardhik, Dip Sankar Banerjee
, Kiran Raj Ramamoorthy, Kishore Kothapalli, Kannan Srinathan:
Nearly Balanced Work Partitioning for Heterogeneous Algorithms. ICPP 2017: 50-59 - 2016
- [j13]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
A graph-based unsupervised N-gram filtration technique for automatic keyphrase extraction. Int. J. Data Min. Model. Manag. 8(2): 124-143 (2016) - [j12]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
Unsupervised deep semantic and logical analysis for identification of solution posts from community answers. Int. J. Inf. Decis. Sci. 8(2): 153-178 (2016) - [c90]Ravi Kishore, Chiranjeevi Vanarasa, Tushant Jha, Kannan Srinathan:
On perfectly secret message transmission in digraphs tolerating dual failures. ICDCN 2016: 29:1-29:10 - [c89]Lokesh Jain, Aditya Chandran, Sanjay Rawat, Kannan Srinathan:
Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach. ICISS 2016: 532-542 - [c88]Mahabir Prasad Jhanwar
, Kannan Srinathan:
Secret Sharing for mNP: Completeness Results. INDOCRYPT 2016: 380-390 - [c87]Aditya Chandran, Lokesh Jain, Sanjay Rawat, Kannan Srinathan:
Discovering Vulnerable Functions: A Code Similarity Based Approach. SSCC 2016: 390-402 - 2015
- [j11]Ananda Swarup Das, Prosenjit Gupta, Kishore Kothapalli, Kannan Srinathan:
Reporting and counting maximal points in a query orthogonal rectangle. J. Discrete Algorithms 30: 78-95 (2015) - [j10]Sk Sazim
, Chiranjeevi Vanarasa, Indranil Chakrabarty, K. Srinathan:
Retrieving and routing quantum information in a quantum network. Quantum Inf. Process. 14(12): 4651-4664 (2015) - [c86]Ravi Kishore, Ashutosh Kumar, Chiranjeevi Vanarasa, Kannan Srinathan:
Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity. ICITS 2015: 33-50 - [c85]Kiran Raj Ramamoorthy, Dip Sankar Banerjee
, Kannan Srinathan, Kishore Kothapalli:
A Novel Heterogeneous Algorithm for Multiplying Scale-Free Sparse Matrices. IPDPS Workshops 2015: 637-646 - 2014
- [j9]Ananda Swarup Das, Prosenjit Gupta, Kishore Kothapalli, Kannan Srinathan:
On reporting the L1 metric closest pair in a query rectangle. Inf. Process. Lett. 114(5): 256-263 (2014) - [c84]Sankalp Khare, Jatin Agarwal, Nadeem Moidu, Kannan Srinathan:
Improved Bounds for Smallest Enclosing Disk Range Queries. CCCG 2014 - [c83]M. R. Rajeevalochana, Kannan Srinathan:
Choosing and Working of an Anonymous Leader. ICAA 2014: 101-109 - [c82]Nadeem Moidu, Jatin Agarwal, Sankalp Khare, Kishore Kothapalli, Kannan Srinathan:
On Generalized Planar Skyline and Convex Hull Range Queries. WALCOM 2014: 34-43 - 2013
- [j8]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission. Theor. Comput. Sci. 496: 2-16 (2013) - [c81]Dharmeet Singh Hora, Piyush Bansal, Kishore Kothapalli, Kannan Srinathan:
Allowing Multiple Rounds in the Shared Whiteboard Model: Some More Impossibility Results. ADCONS 2013: 142-147 - [c80]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
A Knowledge Induced Graph-Theoretical Model for Extract and Abstract Single Document Summarization. CICLing (2) 2013: 408-423 - [c79]Ananda Swarup Das, Prosenjit Gupta, Kannan Srinathan:
Counting Maximal Points in a Query Orthogonal Rectangle. WALCOM 2013: 65-76 - [i14]Jatin Agarwal, Nadeem Moidu, Kishore Kothapalli, Kannan Srinathan:
Efficient Range Reporting of Convex Hull. CoRR abs/1307.5612 (2013) - 2012
- [j7]Ashwinkumar Badanidiyuru, Arpita Patra, Ashish Choudhury, Kannan Srinathan, C. Pandu Rangan:
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission. J. ACM 59(5): 22:1-22:35 (2012) - [c78]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
Using Graph Based Mapping of Co-occurring Words and Closeness Centrality Score for Summarization Evaluation. CICLing (2) 2012: 353-365 - [c77]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
Using Wikipedia Anchor Text and Weighted Clustering Coefficient to Enhance the Traditional Multi-document Summarization. CICLing (2) 2012: 390-401 - [c76]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission. ICDCN 2012: 138-152 - [c75]Rohit Ashok Khot
, Ponnurangam Kumaraguru, Kannan Srinathan:
WYSWYE: shoulder surfing defense for recognition based graphical passwords. OZCHI 2012: 285-294 - [c74]Ananda Swarup Das, Prosenjit Gupta, Anil Kishore Kalavagattu, Jatin Agarwal, Kannan Srinathan, Kishore Kothapalli:
Range Aggregate Maximal Points in the Plane. WALCOM 2012: 52-63 - [i13]Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan:
A New Look at Composition of Authenticated Byzantine Generals. CoRR abs/1203.1463 (2012) - 2011
- [j6]Ananda Swarup Das, Prosenjit Gupta, Kannan Srinathan:
Data Structures for Extension Violations in a Query Range. J. Math. Model. Algorithms 10(1): 79-107 (2011) - [j5]Ashish Choudhury, Arpita Patra, B. V. Ashwinkumar, Kannan Srinathan, C. Pandu Rangan:
Secure message transmission in asynchronous networks. J. Parallel Distributed Comput. 71(8): 1067-1074 (2011) - [c73]Shashank Lagishetty, Pruthvi Reddy Sabbu, Kannan Srinathan:
DMIPS - Defensive Mechanism against IP Spoofing. ACISP 2011: 276-291 - [c72]Pruthvi Reddy Sabbu, Ganugula Umadevi, Kannan Srinathan, Bezawada Bruhadeshwar
:
An Oblivious Image Retrieval Protocol. AINA Workshops 2011: 349-354 - [c71]Ananda Swarup Das, Prosenjit Gupta, Kannan Srinathan:
Detecting VLSI Layout, Connectivity Errors in a Query Window. CCCG 2011 - [c70]Ananda Swarup Das, Prosenjit Gupta, Kannan Srinathan, Kishore Kothapalli:
Finding Maximum Density Axes Parallel Regions for Weighted Point Sets. CCCG 2011 - [c69]Anil Kishore Kalavagattu, Ananda Swarup Das, Kishore Kothapalli, Kannan Srinathan:
On Finding Skyline Points for Range Queries in Plane. CCCG 2011 - [c68]Rohit Ashok Khot
, Kannan Srinathan, Ponnurangam Kumaraguru:
MARASIM: a novel jigsaw based authentication scheme using tagging. CHI 2011: 2605-2614 - [c67]Madhuchand Rushi Pillutla, Nisarg Raval, Piyush Bansal, Kannan Srinathan, C. V. Jawahar
:
LSH based outlier detection and its application in distributed setting. CIKM 2011: 2289-2292 - [c66]Nisarg Raval, Madhuchand Rushi Pillutla, Piyush Bansal, Kannan Srinathan, C. V. Jawahar
:
Privacy Preserving Outlier Detection Using Locality Sensitive Hashing. ICDM Workshops 2011: 674-681 - [c65]Manan Nayak, Shashank Agrawal, Kannan Srinathan:
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks. ICITS 2011: 32-51 - [c64]Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission in Asynchronous Directed Graphs. INDOCRYPT 2011: 359-378 - [c63]Rohit Ashok Khot
, Kannan Srinathan, Rutuja Ashok Khot:
NAPTune: fine tuning graphical authentication. IndiaHCI 2011: 47-56 - [c62]Saladi Rahul, Ananda Swarup Das, Krishnan Sundara Rajan
, Kannan Srinathan:
Range-Aggregate Queries Involving Geometric Aggregation Operations. WALCOM 2011: 122-133 - [c61]Piyush Bansal, Prasant Gopal, Anuj Gupta, Kannan Srinathan, Pranav K. Vasishta:
Byzantine Agreement Using Partial Authentication. DISC 2011: 389-403 - [i12]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
Using Unsupervised System with least linguistic features for TAC-AESOP Task. TAC 2011 - [i11]Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission In Asynchronous Directed Networks. IACR Cryptol. ePrint Arch. 2011: 13 (2011) - [i10]Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Unconditionally Reliable Message Transmission in Directed Neighbour Networks. IACR Cryptol. ePrint Arch. 2011: 14 (2011) - [i9]Manan Nayak, Shashank Agrawal, Kannan Srinathan:
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks. IACR Cryptol. ePrint Arch. 2011: 320 (2011) - 2010
- [j4]Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan:
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality. Int. J. Appl. Cryptogr. 2(2): 159-197 (2010) - [j3]Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, C. V. Jawahar
:
Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans. Inf. Forensics Secur. 5(2): 255-268 (2010) - [c60]Rohit Ashok Khot
, Kannan Srinathan:
PhotoSense: emergent semantics based approach to image annotation. CHI Extended Abstracts 2010: 3301-3306 - [c59]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
Evaluating Information Coverage in Machine Generated Summary and Variable Length Documents. COMAD 2010: 163 - [c58]Niraj Kumar, Venkata Vinay Babu Vemula, Kannan Srinathan, Vasudeva Varma:
Exploiting N-gram Importance and Wikipedia based Additional Knowledge for Improvements in GAAC based Document Clustering. KDIR 2010: 182-187 - [c57]Anuj Gupta, Sandeep Hans, Kannan Srinathan, C. Pandu Rangan:
On Composability of Reliable Unicast and Broadcast. ICDCN 2010: 54-66 - [c56]Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan:
Authenticated Byzantine Generals in Dual Failure Model. ICDCN 2010: 79-91 - [c55]Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, C. V. Jawahar
:
Efficient Privacy Preserving K-Means Clustering. PAISI 2010: 154-166 - [c54]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT. DISC 2010: 201-203 - [i8]Niraj Kumar, Kannan Srinathan, Vasudeva Varma:
An Effective Approach for AESOP and Guided Summarization Task. TAC 2010 - [i7]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission. IACR Cryptol. ePrint Arch. 2010: 392 (2010)
2000 – 2009
- 2009
- [j2]Arpita Patra, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan, Prasad Raghavendra:
Perfectly reliable and secure message transmission tolerating mobile adversary. Int. J. Appl. Cryptogr. 1(3): 200-224 (2009) - [c53]Sandeep Hans, Sarat C. Addepalli, Anuj Gupta, Kannan Srinathan:
On Privacy Preserving Convex Hull. ARES 2009: 187-192 - [c52]Ganugula Umadevi, Sarat C. Addepalli, Kannan Srinathan:
Generalized Robust Combiners for Oblivious Transfer. ARES 2009: 510-515 - [c51]Sarat C. Addepalli, Piyush Bansal, Kannan Srinathan, K. Madhava Krishna:
Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots. ARES 2009: 600-605 - [c50]Rahul Sawhney, K. Madhava Krishna, Kannan Srinathan:
On fast exploration in 2D and 3D terrains with multiple robots. AAMAS (1) 2009: 73-80 - [c49]Ananda Swarup Das, Prosenjit Gupta, Kannan Srinathan:
Data Structures for Reporting Extension Violations in a Query Range. CCCG 2009: 129-132 - [c48]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. AsiaCCS 2009: 171-182 - [c47]Kishore Kothapalli, Rishabh Mukherjee, M. Suhail Rehman, Suryakant Patidar, P. J. Narayanan
, Kannan Srinathan:
A performance prediction model for the CUDA GPGPU platform. HiPC 2009: 463-472 - [c46]Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan, C. V. Jawahar
:
Efficient Biometric Verification in Encrypted Domain. ICB 2009: 899-908 - [c45]Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srinathan, C. V. Jawahar
:
Efficient privacy preserving video surveillance. ICCV 2009: 1639-1646 - [c44]Ashish Choudhary, Arpita Patra, B. V. Ashwinkumar, Kannan Srinathan, C. Pandu Rangan:
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks. ICDCN 2009: 148-162 - [c43]Nagaraja Kaushik Gampa, Rohit Ashok Khot
, Kannan Srinathan:
Let Only the Right One IN: Privacy Management Scheme for Social Network. ICISS 2009: 310-317 - [c42]Prasant Gopal, Anuj Gupta, Pranav K. Vasishta, Piyush Bansal, Kannan Srinathan:
Brief announcement: global consistency can be easier than point-to-point communication. PODC 2009: 310-311 - [c41]Pranav K. Vasishta, Prasant Gopal, Anuj Gupta, Piyush Bansal, K. Srinathan:
Brief announcement: topology knowledge affects probabilistic reliable communication. PODC 2009: 314-315 - 2008
- [c40]Ananda Swarup Das, Jitu Kumar Keshri, Kannan Srinathan, Vaibhav Srivastava:
Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles. ARES 2008: 446-451 - [c39]Rahul Sawhney, K. Madhava Krishna, Kannan Srinathan, Mahesh Mohan:
On reduced time fault tolerant paths for multiple UAVs covering a hostile terrain. AAMAS (3) 2008: 1171-1174 - [c38]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Reliable Message Transmission in Directed Hypergraphs. CANS 2008: 285-303 - [c37]Jagarlamudi Shashank, Palivela Kowshik, Kannan Srinathan, C. V. Jawahar
:
Private Content Based Image Retrieval. CVPR 2008 - [c36]Niraj Kumar, Kannan Srinathan:
Automatic keyphrase extraction from scientific documents using N-gram filtration technique. ACM Symposium on Document Engineering 2008: 199-208 - [c35]Bhavani Shankar, Kannan Srinathan, C. Pandu Rangan:
Alternative Protocols for Generalized Oblivious Transfer. ICDCN 2008: 304-309 - [c34]Chigullapally Narsimha Raju, Ganugula Umadevi, Kannan Srinathan, C. V. Jawahar
:
A novel video encryption technique based on secret sharing. ICIP 2008: 3136-3139 - [c33]Ashish Choudhary, Arpita Patra, B. V. Ashwinkumar, K. Srinathan, C. Pandu Rangan:
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary. ICITS 2008: 137-155 - [c32]Chigullapally Narsimha Raju, Ganugula Umadevi, Kannan Srinathan, C. V. Jawahar
:
Fast and Secure Real-Time Video Encryption. ICVGIP 2008: 257-264 - [c31]Mahesh Mohan, Rahul Sawhney, K. Madhava Krishna, K. Srinathan, Manohar B. Srikanth:
Covering hostile terrains with partial and complete visibilities: On minimum distance paths. IROS 2008: 2572-2577 - [c30]B. V. Ashwinkumar, Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan:
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary. PODC 2008: 115-124 - [c29]Kannan Srinathan, Ashish Choudhary, Arpita Patra, C. Pandu Rangan:
Efficient single phase unconditionally secure message transmission with optimum communication complexity. PODC 2008: 457 - [c28]Bhavani Shankar, Prasant Gopal, Kannan Srinathan, C. Pandu Rangan:
Unconditionally reliable message transmission in directed networks. SODA 2008: 1048-1055 - [i6]Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan:
Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality. IACR Cryptol. ePrint Arch. 2008: 141 (2008) - [i5]Arpita Patra, Ashish Choudhury, B. V. Ashwinkumar, Kannan Srinathan, C. Pandu Rangan:
Perfectly Secure Message Transmission Tolerating Mixed Adversary. IACR Cryptol. ePrint Arch. 2008: 232 (2008) - [i4]Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan:
Authenticated Byzantine Generals in Dual Failure Model. IACR Cryptol. ePrint Arch. 2008: 287 (2008) - [i3]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Reliable Message Transmission in Directed Hypergraphs. IACR Cryptol. ePrint Arch. 2008: 371 (2008) - [i2]Pranav K. Vasishta, Anuj Gupta, Prasant Gopal, Piyush Bansal, Rishabh Mukherjee, M. Poornima, Kannan Srinathan, Kishore Kothapalli:
How Far Must You See To Hear Reliably. IACR Cryptol. ePrint Arch. 2008: 393 (2008) - [i1]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary. IACR Cryptol. ePrint Arch. 2008: 506 (2008) - 2007
- [c27]Kannan Srinathan, Prasad Raghavendra, C. Pandu Rangan:
On Proactive Perfectly Secure Message Transmission. ACISP 2007: 461-473 - [c26]Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan:
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. CANS 2007: 80-101 - [c25]Rohit Ashok Khot
, Ravikant Poola, Kishore Kothapalli, Kannan Srinathan:
Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Networks. ICDCIT 2007: 54-66 - [c24]K. Srinathan, C. Pandu Rangan, Ranjit Kumaresan:
On Exponential Lower Bound for Protocols for Reliable Communication in Networks. ICITS 2007: 89-98 - [c23]Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. INDOCRYPT 2007: 101-122 - [c22]Ananda Swarup Das, Kannan Srinathan, Ritesh Kumar Tiwari, Vaibhav Srivastava:
Privacy Preserving Computation of Shortest Path in Presence of a Single Convex Polygonal Obstacle. MDM 2007: 248-252 - [c21]Kannan Srinathan, N. R. Prasad, C. Pandu Rangan:
On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication. IEEE Symposium on Security and Privacy 2007: 311-320 - [c20]Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan:
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary. DISC 2007: 496-498 - [e1]K. Srinathan, C. Pandu Rangan, Moti Yung:
Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings. Lecture Notes in Computer Science 4859, Springer 2007, ISBN 978-3-540-77025-1 [contents] - 2006
- [j1]Arvind Narayanan, K. Srinathan, C. Pandu Rangan:
Perfectly Reliable Message Transmission. Inf. Process. Lett. 100(1): 23-28 (2006) - [c19]Arpita Patra, Ashish Choudhary, K. Srinathan, C. Pandu Rangan:
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission. INDOCRYPT 2006: 221-235 - [c18]Kannan Srinathan, C. Pandu Rangan:
Possibility and complexity of probabilistic reliable communication in directed networks. PODC 2006: 265-274 - [c17]Matthias Fitzi, Juan A. Garay, Shyamnath Gollakota, C. Pandu Rangan, K. Srinathan:
Round-Optimal and Efficient Verifiable Secret Sharing. TCC 2006: 329-342 - 2004
- [c16]K. Srinathan, Arvind Narayanan, C. Pandu Rangan:
Optimal Perfectly Secure Message Transmission. CRYPTO 2004: 545-561 - [c15]D. V. S. Ravikant, Muthuramakrishnan Venkitasubramaniam, V. Srikanth, K. Srinathan, C. Pandu Rangan:
Brief announcement: on the round complexity of distributed consensus over synchronous networks. PODC 2004: 397 - [c14]D. V. S. Ravikant, Muthuramakrishnan Venkitasubramaniam, V. Srikanth, K. Srinathan, C. Pandu Rangan:
On Byzantine Agreement over (2, 3)-Uniform Hypergraphs. DISC 2004: 450-464 - 2003
- [c13]Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim:
On the Power of Computational Secret Sharing. INDOCRYPT 2003: 162-176 - [c12]S. Amitanand, I. Sanketh, K. Srinathan, Vinod Vaikuntanathan, C. Pandu Rangan:
Distributed consensus in the presence of sectional faults. PODC 2003: 202-210 - [c11]K. Srinathan, Vinod Vaikuntanathan, C. Pandu Rangan:
Brief announcement: efficient perfectly secure communication over synchronous networks. PODC 2003: 252 - 2002
- [c10]M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan:
Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. ACISP 2002: 497-512 - [c9]K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan:
Asynchronous Secure Communication Tolerating Mixed Adversaries. ASIACRYPT 2002: 224-242 - [c8]K. Srinathan, Pranava R. Goundan, M. V. N. Ashwin Kumar, R. Nandakumar, C. Pandu Rangan:
Theory of Equal-Flows in Networks. COCOON 2002: 514-524 - [c7]B. Prabhu, K. Srinathan, C. Pandu Rangan:
Asynchronous Unconditionally Secure Computation: An Efficiency Improvement. INDOCRYPT 2002: 93-107 - [c6]K. Srinathan, N. Tharani Rajan, C. Pandu Rangan:
Non-perfect Secret Sharing over General Access Structures. INDOCRYPT 2002: 409-421 - [c5]M. V. N. Ashwin Kumar, Pranava R. Goundan, K. Srinathan, C. Pandu Rangan:
On perfectly secure cmmunication over arbitrary networks. PODC 2002: 193-202 - [c4]B. Prabhu, K. Srinathan, C. Pandu Rangan:
Trading Players for Efficiency in Unconditional Multiparty Computation. SCN 2002: 342-353 - 2001
- [c3]K. Srinathan, C. Pandu Rangan, V. Kamakoti:
Toward Optimal Player Weights in Secure Distributed Protocols. INDOCRYPT 2001: 232-241 - 2000
- [c2]K. Srinathan, C. Pandu Rangan:
Efficient Asynchronous Secure Multiparty Distributed Computation. INDOCRYPT 2000: 117-129 - [c1]