BibTeX records: C. Pandu Rangan

download as .bib file

@inproceedings{DBLP:conf/cans/ChakrabortyKOR23,
  author       = {Suvradip Chakraborty and
                  Harish Karthikeyan and
                  Adam O'Neill and
                  C. Pandu Rangan},
  editor       = {Jing Deng and
                  Vladimir Kolesnikov and
                  Alexander A. Schwarzmann},
  title        = {Forward Security Under Leakage Resilience, Revisited},
  booktitle    = {Cryptology and Network Security - 22nd International Conference, {CANS}
                  2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14342},
  pages        = {3--27},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7563-1\_1},
  doi          = {10.1007/978-981-99-7563-1\_1},
  timestamp    = {Thu, 09 Nov 2023 15:01:06 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/ChakrabortyKOR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VivekSVR23,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Ramarathnam Venkatesan and
                  C. Pandu Rangan},
  title        = {Compact Identity Based Encryption Based on n{\^{}}\{th\} - Residuosity
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {931},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/931},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VivekSVR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SinghRSA21,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  Samir Sheshank and
                  Richa Agrawal},
  title        = {Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+
                  schemes},
  journal      = {{IET} Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {1--12},
  year         = {2021},
  url          = {https://doi.org/10.1049/ise2.12000},
  doi          = {10.1049/ISE2.12000},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SinghRSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/ChakrabortyRR21,
  author       = {Suvradip Chakraborty and
                  Y. Sreenivasa Rao and
                  C. Pandu Rangan},
  title        = {Efficient single round attribute-based authenticated key exchange
                  protocol},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {313--336},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1873192},
  doi          = {10.1080/23799927.2021.1873192},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/ChakrabortyRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/PaulSR21,
  author       = {Arinjita Paul and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {1--21},
  year         = {2021},
  url          = {https://doi.org/10.22667/JISIS.2021.05.31.001},
  doi          = {10.22667/JISIS.2021.05.31.001},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/PaulSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/DuttaPORS21,
  author       = {Sabyasachi Dutta and
                  Arinjita Paul and
                  Rocki H. Ozaki and
                  C. Pandu Rangan and
                  Kouichi Sakurai},
  title        = {A Distributed Ledger Management Mechanism for Storing and Selling
                  Private Data},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021,
                  Aizuwakamatsu, Japan, January 30 - February 2, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC49826.2021.9346258},
  doi          = {10.1109/DSC49826.2021.9346258},
  timestamp    = {Wed, 17 Feb 2021 11:46:28 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/DuttaPORS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghRAS20,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  Richa Agrawal and
                  Samir Sheshank},
  title        = {Provably secure lattice based identity based unidirectional {PRE}
                  and {PRE+} schemes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102569},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102569},
  doi          = {10.1016/J.JISA.2020.102569},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghRAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/PaulWSR20,
  author       = {Arinjita Paul and
                  Lihua Wang and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {Non-transferability in Proxy Re-Encryption Revisited},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {1--30},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.08.31.001},
  doi          = {10.22667/JISIS.2020.08.31.001},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/PaulWSR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/ChakrabortyAR20,
  author       = {Suvradip Chakraborty and
                  Janaka Alawatugoda and
                  Chandrasekaran Pandu Rangan},
  title        = {New approach to practical leakage-resilient public-key cryptography},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {172--201},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0014},
  doi          = {10.1515/JMC-2019-0014},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ChakrabortyAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/GopalakrishnanK20,
  author       = {Ragavendran Gopalakrishnan and
                  Dimitrios Kanoulas and
                  Naga Naresh Karuturi and
                  C. Pandu Rangan and
                  Rajmohan Rajaraman and
                  Ravi Sundaram},
  title        = {Cache Me if You Can: Capacitated Selfish Replication Games in Networks},
  journal      = {Theory Comput. Syst.},
  volume       = {64},
  number       = {2},
  pages        = {272--310},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00224-019-09939-7},
  doi          = {10.1007/S00224-019-09939-7},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mst/GopalakrishnanK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csonet/AdhikariSPR20,
  author       = {Maneesh Babu Adhikari and
                  Vorapong Suppakitpaisarn and
                  Arinjita Paul and
                  C. Pandu Rangan},
  editor       = {Sriram Chellappan and
                  Kim{-}Kwang Raymond Choo and
                  NhatHai Phan},
  title        = {Two-Stage Framework for Accurate and Differentially Private Network
                  Information Publication},
  booktitle    = {Computational Data and Social Networks - 9th International Conference,
                  CSoNet 2020, Dallas, TX, USA, December 11-13, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12575},
  pages        = {267--279},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66046-8\_22},
  doi          = {10.1007/978-3-030-66046-8\_22},
  timestamp    = {Wed, 06 Jan 2021 16:35:18 +0100},
  biburl       = {https://dblp.org/rec/conf/csonet/AdhikariSPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PaulSR20,
  author       = {Arinjita Paul and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {644--665},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_29},
  doi          = {10.1007/978-3-030-65277-7\_29},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PaulSR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/PaulSBR20,
  author       = {Arinjita Paul and
                  Vorapong Suppakitpaisarn and
                  Mitali Bafna and
                  C. Pandu Rangan},
  title        = {Improving Accuracy of Differentially Private Kronecker Social Networks
                  via Graph Clustering},
  booktitle    = {2020 International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2020, Montreal, QC, Canada, October 20-22, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISNCC49221.2020.9297349},
  doi          = {10.1109/ISNCC49221.2020.9297349},
  timestamp    = {Fri, 15 Jan 2021 09:21:28 +0100},
  biburl       = {https://dblp.org/rec/conf/isncc/PaulSBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyKOR20,
  author       = {Suvradip Chakraborty and
                  Harish Karthikeyan and
                  Adam O'Neill and
                  C. Pandu Rangan},
  title        = {Forward-Security Under Continual Leakage with Deterministic Key Updates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {736},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/736},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyKOR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/KumarKR19,
  author       = {Mehul Kumar and
                  Amit Kumar and
                  C. Pandu Rangan},
  editor       = {Ding{-}Zhu Du and
                  Zhenhua Duan and
                  Cong Tian},
  title        = {Reoptimization of Path Vertex Cover Problem},
  booktitle    = {Computing and Combinatorics - 25th International Conference, {COCOON}
                  2019, Xi'an, China, July 29-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11653},
  pages        = {363--374},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26176-4\_30},
  doi          = {10.1007/978-3-030-26176-4\_30},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/KumarKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChakrabortyR19,
  author       = {Suvradip Chakraborty and
                  C. Pandu Rangan},
  editor       = {Mitsuru Matsui},
  title        = {Public Key Encryption Resilient to Post-challenge Leakage and Tampering
                  Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_2},
  doi          = {10.1007/978-3-030-12612-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChakrabortyR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dappcon/SelviPRDB19,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  C. Pandu Rangan and
                  Siva Dirisala and
                  Saswata Basu},
  title        = {Splitting and Aggregating Signatures in Cryptocurrency Protocols},
  booktitle    = {{IEEE} International Conference on Decentralized Applications and
                  Infrastructures, {DAPPCON} 2019, Newark, CA, USA, April 4-9, 2019},
  pages        = {100--108},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DAPPCON.2019.00021},
  doi          = {10.1109/DAPPCON.2019.00021},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/dappcon/SelviPRDB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/marble/SelviPDBR19,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  Siva Dirisala and
                  Saswata Basu and
                  C. Pandu Rangan},
  editor       = {Panos M. Pardalos and
                  Ilias S. Kotsireas and
                  Yike Guo and
                  William J. Knottenbelt},
  title        = {Sharing of Encrypted Files in Blockchain Made Simpler},
  booktitle    = {1st International Conference on Mathematical Research for Blockchain
                  Economy, {MARBLE} 2019, Santorini, Greece, May 6-9, 2019},
  series       = {Springer Proceedings in Business and Economics},
  pages        = {45--60},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37110-4\_4},
  doi          = {10.1007/978-3-030-37110-4\_4},
  timestamp    = {Tue, 11 Jul 2023 15:51:52 +0200},
  biburl       = {https://dblp.org/rec/conf/marble/SelviPDBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/marble/PaulSR19,
  author       = {Arinjita Paul and
                  Vorapong Suppakitpaisarn and
                  C. Pandu Rangan},
  editor       = {Panos M. Pardalos and
                  Ilias S. Kotsireas and
                  Yike Guo and
                  William J. Knottenbelt},
  title        = {Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion
                  in Social Networks},
  booktitle    = {1st International Conference on Mathematical Research for Blockchain
                  Economy, {MARBLE} 2019, Santorini, Greece, May 6-9, 2019},
  series       = {Springer Proceedings in Business and Economics},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37110-4\_14},
  doi          = {10.1007/978-3-030-37110-4\_14},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/marble/PaulSR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/SelviHDR19,
  author       = {S. Sharmila Deva Selvi and
                  S. Harish and
                  Swethashree Dhanabal and
                  C. Pandu Rangan},
  editor       = {Guojun Wang and
                  Jun Feng and
                  Md. Zakirul Alam Bhuiyan and
                  Rongxing Lu},
  title        = {A Closer Look at Anonymous Proxy Re-Encryption Schemes},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 12th International Conference, SpaCCS 2019, Atlanta, GA,
                  USA, July 14-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11611},
  pages        = {475--489},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24907-6\_36},
  doi          = {10.1007/978-3-030-24907-6\_36},
  timestamp    = {Thu, 05 Sep 2019 15:33:31 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/SelviHDR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-10719,
  author       = {Mehul Kumar and
                  Amit Kumar and
                  C. Pandu Rangan},
  title        = {Reoptimization of Path Vertex Cover Problem},
  journal      = {CoRR},
  volume       = {abs/1904.10719},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.10719},
  eprinttype    = {arXiv},
  eprint       = {1904.10719},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-10719.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviPDBR19,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  Siva Dirisala and
                  Saswata Basu and
                  C. Pandu Rangan},
  title        = {Sharing of Encrypted files in Blockchain Made Simpler},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviPDBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulSR19,
  author       = {Arinjita Paul and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1135},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulSR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulSR19a,
  author       = {Arinjita Paul and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1325},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulSR19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviIR19,
  author       = {S. Sharmila Deva Selvi and
                  Irene Miriam Isaac and
                  C. Pandu Rangan},
  title        = {Cryptanalysis of a pairing-free certificate-based proxy re-encryption
                  scheme for secure data sharing in public clouds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1439},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviIR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PaulSSR18,
  author       = {Arinjita Paul and
                  Varshika Srinivasavaradhan and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption
                  Scheme},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {111--128},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_7},
  doi          = {10.1007/978-3-030-01446-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/PaulSSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyR18,
  author       = {Suvradip Chakraborty and
                  C. Pandu Rangan},
  title        = {Public Key Encryption Resilient to Post-Challenge Leakage and Tampering
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {883},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/883},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulSSR18,
  author       = {Arinjita Paul and
                  Varshika Srinivasavaradhan and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {A CCA-secure collusion-resistant Identity-based Proxy Re-encryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1131},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulSSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviPR18,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  C. Pandu Rangan},
  title        = {A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without
                  Pairing in the Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1136},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChakrabortyPR17,
  author       = {Suvradip Chakraborty and
                  Goutam Paul and
                  C. Pandu Rangan},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Efficient Compilers for After-the-Fact Leakage: From {CPA} to {CCA-2}
                  Secure {PKE} to {AKE}},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {343--362},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_18},
  doi          = {10.1007/978-3-319-60055-0\_18},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChakrabortyPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SrinivasanR17,
  author       = {Akshayaram Srinivasan and
                  Chandrasekaran Pandu Rangan},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Efficiently Obfuscating Re-Encryption Program Under {DDH} Assumption},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {273--292},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_14},
  doi          = {10.1007/978-3-319-61204-1\_14},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SrinivasanR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atis/SelviPR17,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  C. Pandu Rangan},
  editor       = {Lynn Batten and
                  Dong Seong Kim and
                  Xuyun Zhang and
                  Gang Li},
  title        = {An Efficient Non-transferable Proxy Re-encryption Scheme},
  booktitle    = {Applications and Techniques in Information Security - 8th International
                  Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {719},
  pages        = {35--47},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5421-1\_4},
  doi          = {10.1007/978-981-10-5421-1\_4},
  timestamp    = {Mon, 26 Jun 2023 20:45:03 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/SelviPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SelviPR17,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  Chandrasekaran Pandu Rangan},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without
                  Pairing in the Random Oracle Model},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {459--469},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_21},
  doi          = {10.1007/978-3-030-02641-7\_21},
  timestamp    = {Wed, 25 Sep 2019 18:04:17 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SelviPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ChakrabortyRR17,
  author       = {Suvradip Chakraborty and
                  Y. Sreenivasa Rao and
                  Chandrasekaran Pandu Rangan},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {An Efficient Attribute-Based Authenticated Key Exchange Protocol},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {493--503},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_24},
  doi          = {10.1007/978-3-030-02641-7\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ChakrabortyRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GuptaSRD17,
  author       = {Kanika Gupta and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan and
                  Shubham Sopan Dighe},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Identity-Based Group Encryption Revisited},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {205--209},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_18},
  doi          = {10.1007/978-3-319-89500-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/GuptaSRD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChakrabortyAR17,
  author       = {Suvradip Chakraborty and
                  Janaka Alawatugoda and
                  C. Pandu Rangan},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory
                  Leakage Setting},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {167--187},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_10},
  doi          = {10.1007/978-3-319-68637-0\_10},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ChakrabortyAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SelviPR17,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  Chandrasekaran Pandu Rangan},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {413--433},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_25},
  doi          = {10.1007/978-3-319-68637-0\_25},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/SelviPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyAR17,
  author       = {Suvradip Chakraborty and
                  Janaka Alawatugoda and
                  C. Pandu Rangan},
  title        = {New Approach to Practical Leakage-Resilient Public-Key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/441},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyPR17,
  author       = {Suvradip Chakraborty and
                  Goutam Paul and
                  C. Pandu Rangan},
  title        = {Efficient Compilers for After-the-Fact Leakage: from {CPA} to {CCA-2}
                  secure {PKE} to {AKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyRMR17,
  author       = {Suvradip Chakraborty and
                  Chester Rebeiro and
                  Debdeep Mukhopadhyay and
                  C. Pandu Rangan},
  title        = {Leakage-Resilient Tweakable Encryption from One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyRMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviPR17,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  C. Pandu Rangan},
  title        = {An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {768},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/768},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviPR17a,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  C. Pandu Rangan},
  title        = {On the security of a Certificateless Proxy Re-Encryption Scheme without
                  Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/867},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviPR17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/SinghRB16,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  title        = {Lattice-based identity-based resplittable threshold public key encryption
                  scheme},
  journal      = {Int. J. Comput. Math.},
  volume       = {93},
  number       = {2},
  pages        = {289--307},
  year         = {2016},
  url          = {https://doi.org/10.1080/00207160.2014.928286},
  doi          = {10.1080/00207160.2014.928286},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/SinghRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/VivekSCR16,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Pallavi Chandrasekar and
                  C. Pandu Rangan},
  title        = {Formalizing the Relationship Between Commitment and Basic Cryptographic
                  Primitives},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {35--53},
  year         = {2016},
  url          = {https://doi.org/10.22667/JISIS.2016.11.31.035},
  doi          = {10.22667/JISIS.2016.11.31.035},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/VivekSCR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChakrabortyRR16,
  author       = {Suvradip Chakraborty and
                  Srinivasan Raghuraman and
                  C. Pandu Rangan},
  title        = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange
                  Protocol Secure Against Memory-Scrapers},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {1--22},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.001},
  doi          = {10.22667/JOWUA.2016.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChakrabortyRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SivanandamSSR16,
  author       = {Sree Vivek Sivanandam and
                  S. Sharmila Deva Selvi and
                  Akshayaram Srinivasan and
                  Chandrasekaran Pandu Rangan},
  title        = {Stronger public key encryption system withstanding {RAM} scraper like
                  attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1650--1662},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1454},
  doi          = {10.1002/SEC.1454},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SivanandamSSR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyRR16,
  author       = {Suvradip Chakraborty and
                  Srinivasan Raghuraman and
                  C. Pandu Rangan},
  title        = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange
                  Protocol Secure Against Memory-Scrapers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PatraCR15,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan},
  title        = {Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {1},
  pages        = {49--109},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9172-7},
  doi          = {10.1007/S00145-013-9172-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PatraCR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/SinghRB15,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  title        = {Lattice Based Mix Network for Location Privacy in Mobile System},
  journal      = {Mob. Inf. Syst.},
  volume       = {2015},
  pages        = {963628:1--963628:9},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/963628},
  doi          = {10.1155/2015/963628},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/SinghRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Bose0R15,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Chandrasekaran Pandu Rangan},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Constant Size Ring Signature Without Random Oracle},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {230--247},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_14},
  doi          = {10.1007/978-3-319-19962-7\_14},
  timestamp    = {Tue, 07 May 2024 20:09:57 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Bose0R15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SrinivasanR15,
  author       = {Akshayaram Srinivasan and
                  C. Pandu Rangan},
  editor       = {Feng Bao and
                  Steven Miller and
                  Sherman S. M. Chow and
                  Danfeng Yao},
  title        = {Certificateless Proxy Re-Encryption Without Pairing: Revisited},
  booktitle    = {Proceedings of the 3rd International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
                  14, 2015},
  pages        = {41--52},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732516.2732519},
  doi          = {10.1145/2732516.2732519},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SrinivasanR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChakrabortyPR15,
  author       = {Suvradip Chakraborty and
                  Goutam Paul and
                  C. Pandu Rangan},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Forward-Secure Authenticated Symmetric Key Exchange Protocol: New
                  Security Model and Secure Construction},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {149--166},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_8},
  doi          = {10.1007/978-3-319-26059-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ChakrabortyPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VivekSMR15,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Aanchal Malhotra and
                  C. Pandu Rangan},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Practical {IBE} Secure under {CBDH} - Encrypting Without Pairing},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {251--258},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005541802510258},
  doi          = {10.5220/0005541802510258},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VivekSMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoseDR15,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  C. Pandu Rangan},
  title        = {Constant Size Ring Signature Without Random Oracle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoseDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyRR15a,
  author       = {Suvradip Chakraborty and
                  Srinivasan Raghuraman and
                  C. Pandu Rangan},
  title        = {Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key
                  Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyRR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SrinivasanR15,
  author       = {Akshayaram Srinivasan and
                  C. Pandu Rangan},
  title        = {Efficiently Obfuscating Re-Encryption Program under {DDH} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {822},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/822},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SrinivasanR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarthikeyanCSR15,
  author       = {Harish Karthikeyan and
                  Suvradip Chakraborty and
                  Kunwar Singh and
                  C. Pandu Rangan},
  title        = {An Efficient Multiple {PKG} Compatible Identity Based Key Agreement
                  for Vehicular Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarthikeyanCSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/PatraCR14,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan},
  title        = {Asynchronous Byzantine Agreement with optimal resilience},
  journal      = {Distributed Comput.},
  volume       = {27},
  number       = {2},
  pages        = {111--146},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00446-013-0200-5},
  doi          = {10.1007/S00446-013-0200-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dc/PatraCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SinghRB14,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  title        = {Lattice Based Universal Re-encryption for Mixnet},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {1--11},
  year         = {2014},
  url          = {https://doi.org/10.22667/JISIS.2014.02.31.001},
  doi          = {10.22667/JISIS.2014.02.31.001},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SinghRB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SinghRB14a,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  title        = {Guest Editorial: Special Issue on Cyber Security Protections and Applications},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {1--3},
  year         = {2014},
  url          = {https://doi.org/10.22667/JISIS.2014.05.31.001},
  doi          = {10.22667/JISIS.2014.05.31.001},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SinghRB14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/JoseGP14,
  author       = {Sangeetha Jose and
                  Akash Gautam and
                  Chandrasekaran Pandu Rangan},
  title        = {A New Certificateless Blind Signature Scheme},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {1},
  pages        = {122--141},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.03.31.122},
  doi          = {10.22667/JOWUA.2014.03.31.122},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/JoseGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/BadrinarayananR14,
  author       = {Saikrishna Badrinarayanan and
                  C. Pandu Rangan},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Joaquim Filipe},
  title        = {Certificateless and Identity based Authenticated Key Exchange Protocols},
  booktitle    = {E-Business and Telecommunications - 11th International Joint Conference,
                  {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {554},
  pages        = {255--277},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-25915-4\_14},
  doi          = {10.1007/978-3-319-25915-4\_14},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/BadrinarayananR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/SinghRB14,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {Efficient Lattice {HIBE} in the Standard Model with Shorter Public
                  Parameters},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {542--553},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_56},
  doi          = {10.1007/978-3-642-55032-4\_56},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/SinghRB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/SinghRB14a,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {564--575},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_58},
  doi          = {10.1007/978-3-642-55032-4\_58},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/SinghRB14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BadrinarayananR14,
  author       = {Saikrishna Badrinarayanan and
                  C. Pandu Rangan},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Pairing-free Single Round Certificateless and Identity Based Authenticated
                  Key Exchange Protocols},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {67--78},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005043400670078},
  doi          = {10.5220/0005043400670078},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BadrinarayananR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/SinghRB14,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  editor       = {Rajat Subhra Chakraborty and
                  Vashek Matyas and
                  Patrick Schaumont},
  title        = {Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                  Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8804},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12060-7\_6},
  doi          = {10.1007/978-3-319-12060-7\_6},
  timestamp    = {Mon, 15 Jun 2020 17:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/space/SinghRB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SrinivasanR14,
  author       = {Akshayaram Srinivasan and
                  C. Pandu Rangan},
  title        = {Certificateless Proxy Re-Encryption Without Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {933},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/933},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SrinivasanR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SinghPB13,
  author       = {Kunwar Singh and
                  C. Pandurangan and
                  A. K. Banerjee},
  title        = {Lattice Based Forward-Secure Identity Based Encryption Scheme with
                  Shorter Ciphertext},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {5--19},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.005},
  doi          = {10.22667/JISIS.2013.02.31.005},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SinghPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SelviVPR13,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Vivek Krishna Pradhan and
                  C. Pandu Rangan},
  title        = {Efficient Certificateless Online/Offline Signature with tight security},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {115--137},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.115},
  doi          = {10.22667/JISIS.2013.02.31.115},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SelviVPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SinghRB13,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  title        = {Lattice Based Identity Based Proxy Re-Encryption Scheme},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {38--51},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.038},
  doi          = {10.22667/JISIS.2013.11.31.038},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SinghRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SinghRB13,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  title        = {Lattice Based Efficient Threshold Public Key Encryption Scheme},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {93--107},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.093},
  doi          = {10.22667/JOWUA.2013.12.31.093},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SinghRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MathewVR13,
  author       = {K. Preetha Mathew and
                  Sachin Vasant and
                  C. Pandu Rangan},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {A Provably Secure Signature and Signcryption Scheme Using the Hardness
                  Assumptions in Coding Theory},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {342--362},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_21},
  doi          = {10.1007/978-3-319-12160-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MathewVR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MathewVR13a,
  author       = {K. Preetha Mathew and
                  Sachin Vasant and
                  C. Pandu Rangan},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {Efficient Code Based Hybrid and Deterministic Encryptions in the Standard
                  Model},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {517--535},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_31},
  doi          = {10.1007/978-3-319-12160-4\_31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MathewVR13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/VivekSVR13,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Layamrudhaa Renganathan Venkatesan and
                  C. Pandu Rangan},
  editor       = {Willy Susilo and
                  Reza Reyhanitabar},
  title        = {Efficient, Pairing-Free, Authenticated Identity Based Key Agreement
                  in a Single Round},
  booktitle    = {Provable Security - 7th International Conference, ProvSec 2013, Melaka,
                  Malaysia, October 23-25, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8209},
  pages        = {38--58},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41227-1\_3},
  doi          = {10.1007/978-3-642-41227-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/VivekSVR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/BarapatreR13,
  author       = {Prateek Barapatre and
                  Chandrasekaran Pandu Rangan},
  editor       = {Benedikt Gierlichs and
                  Sylvain Guilley and
                  Debdeep Mukhopadhyay},
  title        = {Identity-Based Identification Schemes from ID-KEMs},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - Third International
                  Conference, {SPACE} 2013, Kharagpur, India, October 19-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8204},
  pages        = {111--129},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41224-0\_9},
  doi          = {10.1007/978-3-642-41224-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/BarapatreR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/BarapatreR13a,
  author       = {Prateek Barapatre and
                  Chandrasekaran Pandu Rangan},
  editor       = {Benedikt Gierlichs and
                  Sylvain Guilley and
                  Debdeep Mukhopadhyay},
  title        = {Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without
                  Pairings},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - Third International
                  Conference, {SPACE} 2013, Kharagpur, India, October 19-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8204},
  pages        = {130--146},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41224-0\_10},
  doi          = {10.1007/978-3-642-41224-0\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/BarapatreR13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbinavBRSVP13,
  author       = {Karthik Abinav and
                  Saikrishna Badrinarayanan and
                  C. Pandu Rangan and
                  S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Vivek Krishna Pradhan},
  title        = {A Revocable Online-Offline Certificateless Signature Scheme without
                  Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {758},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/758},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbinavBRSVP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/BadanidiyuruPCSR12,
  author       = {Ashwinkumar Badanidiyuru and
                  Arpita Patra and
                  Ashish Choudhury and
                  Kannan Srinathan and
                  C. Pandu Rangan},
  title        = {On the trade-off between network connectivity, round complexity, and
                  communication complexity of reliable message transmission},
  journal      = {J. {ACM}},
  volume       = {59},
  number       = {5},
  pages        = {22:1--22:35},
  year         = {2012},
  url          = {https://doi.org/10.1145/2371656.2371657},
  doi          = {10.1145/2371656.2371657},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/BadanidiyuruPCSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SelviVPR12,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Vivek Krishna Pradhan and
                  C. Pandu Rangan},
  title        = {Efficient Certificateless Online/Offline Signature},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {2},
  number       = {3/4},
  pages        = {77--92},
  year         = {2012},
  url          = {https://doi.org/10.22667/JISIS.2012.11.31.077},
  doi          = {10.22667/JISIS.2012.11.31.077},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SelviVPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SinghPB12,
  author       = {Kunwar Singh and
                  C. Pandurangan and
                  A. K. Banerjee},
  title        = {Lattice Forward-Secure Identity Based Encryption Scheme},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {2},
  number       = {3/4},
  pages        = {118--128},
  year         = {2012},
  url          = {https://doi.org/10.22667/JISIS.2012.11.31.118},
  doi          = {10.22667/JISIS.2012.11.31.118},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SinghPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VivekSVR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Ramarathnam Venkatesan and
                  C. Pandu Rangan},
  title        = {A Special Purpose Signature Scheme for Secure Computation of Traffic
                  in a Distributed Network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {46--60},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.046},
  doi          = {10.22667/JOWUA.2012.12.31.046},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VivekSVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VivekSKR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Salini Selvaraj Kowsalya and
                  C. Pandu Rangan},
  title        = {{PKI} Based Signcryption without Pairing: an Efficient Scheme with
                  Tight Security Reduction},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {72--84},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.072},
  doi          = {10.22667/JOWUA.2012.12.31.072},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VivekSKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/VivekSSR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Deepanshu Shukla and
                  C. Pandu Rangan},
  title        = {Group key establishment {(GKE):} Two/three party key exchange to {GKE}},
  booktitle    = {{IEEE} International Conference on Advanced Networks and Telecommuncations
                  Systems, {ANTS} 2012, Bangalore, India, 16-19 December, 2012},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ANTS.2012.6524229},
  doi          = {10.1109/ANTS.2012.6524229},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEants/VivekSSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MathewVVR12,
  author       = {K. Preetha Mathew and
                  Sachin Vasant and
                  Sridhar Venkatesan and
                  C. Pandu Rangan},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {An Efficient {IND-CCA2} Secure Variant of the Niederreiter Encryption
                  Scheme in the Standard Model},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {166--179},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_13},
  doi          = {10.1007/978-3-642-31448-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MathewVVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SelviVR12,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Deterministic Identity Based Signature Scheme and Its Application
                  for Aggregate Signatures},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {280--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_21},
  doi          = {10.1007/978-3-642-31448-3\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SelviVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/RameshRISR12,
  author       = {Amitash Ramesh and
                  Soumya Ramesh and
                  Sudarshan Iyengar and
                  Vinod Sekhar and
                  C. Pandu Rangan},
  title        = {Obstacles Incentivize Human Learning: {A} Network Theoretic Study},
  booktitle    = {International Conference on Advances in Social Networks Analysis and
                  Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012},
  pages        = {1295--1300},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ASONAM.2012.223},
  doi          = {10.1109/ASONAM.2012.223},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/RameshRISR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/MIMRPM12,
  author       = {M. Vijesh and
                  Sudarshan Iyengar and
                  S. M. Vijay Mahantesh and
                  Amitash Ramesh and
                  C. Pandu Rangan and
                  Veni Madhavan},
  title        = {A Navigation Algorithm Inspired by Human Navigation},
  booktitle    = {International Conference on Advances in Social Networks Analysis and
                  Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012},
  pages        = {1309--1314},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ASONAM.2012.225},
  doi          = {10.1109/ASONAM.2012.225},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/MIMRPM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KVVR12,
  author       = {K. Preetha Mathew and
                  Sachin Vasant and
                  Sridhar Venkatesan and
                  C. Pandu Rangan},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {144--157},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_10},
  doi          = {10.1007/978-3-642-29101-2\_10},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/KVVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/VivekSR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Compact Stateful Encryption Schemes with Ciphertext Verifiability},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {87--104},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_6},
  doi          = {10.1007/978-3-642-34117-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/VivekSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latin/GopalakrishnanKKRRS12,
  author       = {Ragavendran Gopalakrishnan and
                  Dimitrios Kanoulas and
                  Naga Naresh Karuturi and
                  C. Pandu Rangan and
                  Rajmohan Rajaraman and
                  Ravi Sundaram},
  editor       = {David Fern{\'{a}}ndez{-}Baca},
  title        = {Cache Me If You Can: Capacitated Selfish Replication Games},
  booktitle    = {{LATIN} 2012: Theoretical Informatics - 10th Latin American Symposium,
                  Arequipa, Peru, April 16-20, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7256},
  pages        = {420--432},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29344-3\_36},
  doi          = {10.1007/978-3-642-29344-3\_36},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/latin/GopalakrishnanKKRRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SelviVVR12,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Dhinakaran Vinayagamurthy and
                  C. Pandu Rangan},
  editor       = {Tsuyoshi Takagi and
                  Guilin Wang and
                  Zhiguang Qin and
                  Shaoquan Jiang and
                  Yong Yu},
  title        = {{ID} Based Signcryption Scheme in Standard Model},
  booktitle    = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,
                  China, September 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7496},
  pages        = {35--52},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33272-2\_4},
  doi          = {10.1007/978-3-642-33272-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/SelviVVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sarnoff/SelviVSR12,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  J. Shriram and
                  C. Pandu Rangan},
  title        = {Identity based partial aggregate signature scheme without pairing},
  booktitle    = {35th {IEEE} Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SARNOF.2012.6222731},
  doi          = {10.1109/SARNOF.2012.6222731},
  timestamp    = {Mon, 10 Feb 2020 16:25:22 +0100},
  biburl       = {https://dblp.org/rec/conf/sarnoff/SelviVSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/SinghPB12,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  editor       = {Andrey Bogdanov and
                  Somitra Kumar Sanadhya},
  title        = {Adaptively Secure Efficient Lattice {(H)IBE} in Standard Model with
                  Short Public Parameters},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - Second International
                  Conference, {SPACE} 2012, Chennai, India, November 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7644},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34416-9\_11},
  doi          = {10.1007/978-3-642-34416-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/SinghPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/GaneshR12,
  author       = {Chaya Ganesh and
                  C. Pandu Rangan},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Optimal Parameters for Efficient Two-Party Computation Protocols},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {128--143},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_12},
  doi          = {10.1007/978-3-642-30955-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/GaneshR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VivekSBR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Guhan Balasubramanian and
                  C. Pandu Rangan},
  title        = {Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VivekSBR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VivekSR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {Stronger Public Key Encryption Schemes Withstanding {RAM} Scraper
                  Like Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VivekSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVVR12,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Dhinakaran Vinayagamurthy and
                  C. Pandu Rangan},
  title        = {{ID} Based Signcryption Scheme in Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KVR12,
  author       = {K. Preetha Mathew and
                  Sachin Vasant and
                  C. Pandu Rangan},
  title        = {On Provably Secure Code-Based Signature and Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgaa/ReddyR11,
  author       = {T. V. Thirumala Reddy and
                  C. Pandu Rangan},
  title        = {Variants of Spreading Messages},
  journal      = {J. Graph Algorithms Appl.},
  volume       = {15},
  number       = {5},
  pages        = {683--699},
  year         = {2011},
  url          = {https://doi.org/10.7155/jgaa.00244},
  doi          = {10.7155/JGAA.00244},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jgaa/ReddyR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/ChoudhuryPASR11,
  author       = {Ashish Choudhury and
                  Arpita Patra and
                  B. V. Ashwinkumar and
                  Kannan Srinathan and
                  C. Pandu Rangan},
  title        = {Secure message transmission in asynchronous networks},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {71},
  number       = {8},
  pages        = {1067--1074},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jpdc.2011.03.004},
  doi          = {10.1016/J.JPDC.2011.03.004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/ChoudhuryPASR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/PatraR11,
  author       = {Arpita Patra and
                  C. Pandu Rangan},
  editor       = {Serge Fehr},
  title        = {Communication Optimal Multi-valued Asynchronous Byzantine Agreement
                  with Optimal Resilience},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {206--226},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_19},
  doi          = {10.1007/978-3-642-20728-0\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/PatraR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosechicomnet/SelviVR11,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Marc Joye and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {Identity Based Online/Offline Encryption and Signcryption Schemes
                  Revisited},
  booktitle    = {Security Aspects in Information Technology - First International Conference,
                  InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7011},
  pages        = {111--127},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24586-2\_11},
  doi          = {10.1007/978-3-642-24586-2\_11},
  timestamp    = {Fri, 27 Mar 2020 08:56:51 +0100},
  biburl       = {https://dblp.org/rec/conf/infosechicomnet/SelviVR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SelviVR11,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Identity-Based Deterministic Signature Scheme without Forking-Lemma},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {79--95},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_6},
  doi          = {10.1007/978-3-642-25141-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SelviVR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VivekSR11,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {{CCA} Secure Certificateless Encryption Schemes based on {RSA}},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {208--217},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VivekSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vcip/SundarR11,
  author       = {R. Shyam Sundar and
                  C. Pandu Rangan},
  editor       = {Jar{-}Ferr Yang and
                  Hsueh{-}Ming Hang and
                  Masayuki Tanimoto and
                  Tsuhan Chen},
  title        = {Bit-depth scalable video coding using error residual correction},
  booktitle    = {2011 {IEEE} Visual Communications and Image Processing, {VCIP} 2011,
                  Tainan, Taiwan, November 6-9, 2011},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/VCIP.2011.6116060},
  doi          = {10.1109/VCIP.2011.6116060},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/vcip/SundarR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/walcom/GhoshNR11,
  author       = {Esha Ghosh and
                  N. S. Narayanaswamy and
                  C. Pandu Rangan},
  editor       = {Naoki Katoh and
                  Amit Kumar},
  title        = {A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs},
  booktitle    = {{WALCOM:} Algorithms and Computation - 5th International Workshop,
                  {WALCOM} 2011, New Delhi, India, February 18-20, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6552},
  pages        = {191--201},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19094-0\_20},
  doi          = {10.1007/978-3-642-19094-0\_20},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/walcom/GhoshNR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1109-1706,
  author       = {Esha Ghosh and
                  Subhas Kumar Ghosh and
                  C. Pandu Rangan},
  title        = {On the Fault Tolerance and Hamiltonicity of the Optical Transpose
                  Interconnection System of Non-Hamiltonian Base Graphs},
  journal      = {CoRR},
  volume       = {abs/1109.1706},
  year         = {2011},
  url          = {http://arxiv.org/abs/1109.1706},
  eprinttype    = {arXiv},
  eprint       = {1109.1706},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1109-1706.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-4033,
  author       = {William K. Moses Jr. and
                  C. Pandu Rangan},
  title        = {Rational Secret Sharing over an Asynchronous Broadcast Channel with
                  Information Theoretic Security},
  journal      = {CoRR},
  volume       = {abs/1112.4033},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.4033},
  eprinttype    = {arXiv},
  eprint       = {1112.4033},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-4033.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MosesR11,
  author       = {William K. Moses Jr. and
                  C. Pandu Rangan},
  title        = {Rational Secret Sharing with Honest Players over an Asynchronous Channel},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MosesR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR11,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Identity Based Deterministic Signature Scheme Without Forking-Lemma},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VivekSR11,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {Compact CCA-Secure Encryption with Ciphertext Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VivekSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVVR11,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Dhinakaran Vinayagamurthy and
                  C. Pandu Rangan},
  title        = {On the Security of {ID} Based Signcryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {664},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/664},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVVR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR11a,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Deterministic Identity Based Signature Scheme and its Application
                  for Aggregate Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/695},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/PatraCRS10,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan and
                  Kannan Srinathan},
  title        = {Unconditionally reliable and secure message transmission in undirected
                  synchronous networks: possibility, feasibility and optimality},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {159--197},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.038309},
  doi          = {10.1504/IJACT.2010.038309},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/PatraCRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mics/SivanHR10,
  author       = {Balasubramanian Sivan and
                  S. Harini and
                  C. Pandu Rangan},
  title        = {On Conditional Covering Problem},
  journal      = {Math. Comput. Sci.},
  volume       = {3},
  number       = {1},
  pages        = {97--107},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11786-009-0001-1},
  doi          = {10.1007/S11786-009-0001-1},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mics/SivanHR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/PatraCR10,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Communication Efficient Perfectly Secure {VSS} and {MPC} in Asynchronous
                  Networks with Optimal Resilience},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {184--202},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_12},
  doi          = {10.1007/978-3-642-12678-9\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/PatraCR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KumaresanPR10,
  author       = {Ranjit Kumaresan and
                  Arpita Patra and
                  C. Pandu Rangan},
  editor       = {Masayuki Abe},
  title        = {The Round Complexity of Verifiable Secret Sharing: The Statistical
                  Case},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {431--447},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_25},
  doi          = {10.1007/978-3-642-17373-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KumaresanPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/KumarABR10,
  author       = {Swarun Kumar and
                  Shivank Agrawal and
                  Subha Balaraman and
                  C. Pandu Rangan},
  editor       = {Jan Camenisch and
                  Costas Lambrinoudakis},
  title        = {Attribute Based Signatures for Bounded Multi-level Threshold Circuits},
  booktitle    = {Public Key Infrastructures, Services and Applications - 7th European
                  Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6711},
  pages        = {141--154},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22633-5\_10},
  doi          = {10.1007/978-3-642-22633-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/KumarABR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/PatraCR10,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Krishna Kant and
                  Sriram V. Pemmaraju and
                  Krishna M. Sivalingam and
                  Jie Wu},
  title        = {On Communication Complexity of Secure Message Transmission in Directed
                  Networks},
  booktitle    = {Distributed Computing and Networking, 11th International Conference,
                  {ICDCN} 2010, Kolkata, India, January 3-6, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5935},
  pages        = {42--53},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11322-2\_9},
  doi          = {10.1007/978-3-642-11322-2\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/PatraCR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/GuptaHSR10,
  author       = {Anuj Gupta and
                  Sandeep Hans and
                  Kannan Srinathan and
                  C. Pandu Rangan},
  editor       = {Krishna Kant and
                  Sriram V. Pemmaraju and
                  Krishna M. Sivalingam and
                  Jie Wu},
  title        = {On Composability of Reliable Unicast and Broadcast},
  booktitle    = {Distributed Computing and Networking, 11th International Conference,
                  {ICDCN} 2010, Kolkata, India, January 3-6, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5935},
  pages        = {54--66},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11322-2\_10},
  doi          = {10.1007/978-3-642-11322-2\_10},
  timestamp    = {Fri, 02 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/GuptaHSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KumarAVLR10,
  author       = {Swarun Kumar and
                  Shivank Agrawal and
                  Ramarathnam Venkatesan and
                  Satyanarayana V. Lokam and
                  C. Pandu Rangan},
  editor       = {Mohammad S. Obaidat and
                  George A. Tsihrintzis and
                  Joaquim Filipe},
  title        = {Threshold Discernible Ring Signatures},
  booktitle    = {e-Business and Telecommunications - 7th International Joint Conference,
                  {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {222},
  pages        = {259--273},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25206-8\_17},
  doi          = {10.1007/978-3-642-25206-8\_17},
  timestamp    = {Sat, 19 Oct 2019 20:35:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KumarAVLR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SelviVR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Certificateless {KEM} and Hybrid Signcryption Schemes Revisited},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {294--307},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_22},
  doi          = {10.1007/978-3-642-12827-1\_22},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SelviVR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/NarasimhanVR10,
  author       = {Harikrishna Narasimhan and
                  Venkatanathan Varadarajan and
                  C. Pandu Rangan},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {Game Theoretic Resistance to Denial of Service Attacks Using Hidden
                  Difficulty Puzzles},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {359--376},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_26},
  doi          = {10.1007/978-3-642-12827-1\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/NarasimhanVR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/PatraR10,
  author       = {Arpita Patra and
                  C. Pandu Rangan},
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {Communication Optimal Multi-valued Asynchronous Broadcast Protocol},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  pages        = {162--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8\_10},
  doi          = {10.1007/978-3-642-14712-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/PatraR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SelviVRP10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Chandrasekaran Pandu Rangan and
                  S. Priti},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {On the Security of Identity Based Threshold Unsigncryption Schemes},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {554--559},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.99},
  doi          = {10.1109/NSS.2010.99},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/SelviVRP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SelviVNR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  S. Gopi Nath and
                  C. Pandu Rangan},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Identity Based Self Delegated Signature - Self Proxy Signatures},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {568--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.98},
  doi          = {10.1109/NSS.2010.98},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/SelviVNR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/SundarR10,
  author       = {R. Shyam Sundar and
                  C. Pandu Rangan},
  editor       = {Guoping Qiu and
                  Kin{-}Man Lam and
                  Hitoshi Kiya and
                  Xiangyang Xue and
                  C.{-}C. Jay Kuo and
                  Michael S. Lew},
  title        = {Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding},
  booktitle    = {Advances in Multimedia Information Processing - {PCM} 2010 - 11th
                  Pacific Rim Conference on Multimedia, Shanghai, China, September 2010,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6298},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15696-0\_12},
  doi          = {10.1007/978-3-642-15696-0\_12},
  timestamp    = {Mon, 26 Jun 2023 20:47:39 +0200},
  biburl       = {https://dblp.org/rec/conf/pcm/SundarR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/PatraR10,
  author       = {Arpita Patra and
                  C. Pandu Rangan},
  editor       = {Andr{\'{e}}a W. Richa and
                  Rachid Guerraoui},
  title        = {Brief announcement: communication efficient asynchronous byzantine
                  agreement},
  booktitle    = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010},
  pages        = {243--244},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1835698.1835756},
  doi          = {10.1145/1835698.1835756},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/PatraR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/PatraCR10,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan},
  editor       = {Andr{\'{e}}a W. Richa and
                  Rachid Guerraoui},
  title        = {Brief announcement: perfectly secure message transmissiontolerating
                  mobile mixed adversary with reduced phase complexity},
  booktitle    = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010},
  pages        = {245--246},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1835698.1835757},
  doi          = {10.1145/1835698.1835757},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/PatraCR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SelviVR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Identity Based Public Verifiable Signcryption Scheme},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {244--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_17},
  doi          = {10.1007/978-3-642-16280-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/SelviVR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SelviVAR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Sakhi S. Anand and
                  C. Pandu Rangan},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {An Identity based Ring Signcryption Scheme with Public Verifiability},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {362--371},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SelviVAR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KumarAVLR10,
  author       = {Swarun Kumar and
                  Shivank Agrawal and
                  Ramarathnam Venkatesan and
                  Satyanarayana V. Lokam and
                  C. Pandu Rangan},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Forcing Out a Confession - Threshold Discernible Ring Signatures},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {379--388},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KumarAVLR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/walcom/ReddyKR10,
  author       = {T. V. Thirumala Reddy and
                  D. Sai Krishna and
                  C. Pandu Rangan},
  editor       = {Md. Saidur Rahman and
                  Satoshi Fujita},
  title        = {Variants of Spreading Messages},
  booktitle    = {{WALCOM:} Algorithms and Computation, 4th International Workshop,
                  {WALCOM} 2010, Dhaka, Bangladesh, February 10-12, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5942},
  pages        = {240--251},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11440-3\_22},
  doi          = {10.1007/978-3-642-11440-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/walcom/ReddyKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/walcom/KrishnaRSR10,
  author       = {D. Sai Krishna and
                  T. V. Thirumala Reddy and
                  B. Sai Shashank and
                  C. Pandu Rangan},
  editor       = {Md. Saidur Rahman and
                  Satoshi Fujita},
  title        = {Pathwidth and Searching in Parameterized Threshold Graphs},
  booktitle    = {{WALCOM:} Algorithms and Computation, 4th International Workshop,
                  {WALCOM} 2010, Dhaka, Bangladesh, February 10-12, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5942},
  pages        = {293--304},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11440-3\_27},
  doi          = {10.1007/978-3-642-11440-3\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/walcom/KrishnaRSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/NarasimhanVC10,
  author       = {Harikrishna Narasimhan and
                  Venkatanathan Varadarajan and
                  C. Pandu Rangan},
  title        = {Towards a Cooperative Defense Model Against Network Security Attacks},
  booktitle    = {9th Annual Workshop on the Economics of Information Security, {WEIS}
                  2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010},
  year         = {2010},
  url          = {http://weis2010.econinfosec.org/papers/session4/weis2010\_narasimhan.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:46 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/NarasimhanVC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-3504,
  author       = {Arpita Patra and
                  C. Pandu Rangan},
  title        = {Communication and Round Efficient Information Checking Protocol},
  journal      = {CoRR},
  volume       = {abs/1004.3504},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.3504},
  eprinttype    = {arXiv},
  eprint       = {1004.3504},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-3504.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1007-2694,
  author       = {Ragavendran Gopalakrishnan and
                  Dimitrios Kanoulas and
                  Naga Naresh Karuturi and
                  C. Pandu Rangan and
                  Rajmohan Rajaraman and
                  Ravi Sundaram},
  title        = {Capacitated Caching Games},
  journal      = {CoRR},
  volume       = {abs/1007.2694},
  year         = {2010},
  url          = {http://arxiv.org/abs/1007.2694},
  eprinttype    = {arXiv},
  eprint       = {1007.2694},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1007-2694.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR10,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Communication Efficient Perfectly Secure {VSS} and {MPC} in Asynchronous
                  Networks with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Security Weaknesses in Two Certificateless Signcryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKSR10,
  author       = {Shivank Agrawal and
                  Swarun Kumar and
                  Amjed Shareef and
                  C. Pandu Rangan},
  title        = {Sanitizable signatures with strong transparency in the standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10a,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Identity Based Online/Offline Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShareefAR10,
  author       = {Amjed Shareef and
                  Akshay Agrawal and
                  C. Pandu Rangan},
  title        = {Collusion Free Protocol for Correlated Element Selection Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShareefAR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10b,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Identity Based Public Verifiable Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVNR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  S. Gopi Nath and
                  C. Pandu Rangan},
  title        = {Identity Based Self Delegated Signature - Self Proxy Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVNR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVPR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  S. Priti and
                  C. Pandu Rangan},
  title        = {On the Security of Identity Based Threshold Unsigncryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10c,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Identity Based Online/Offline Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10d,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {{CCA2} Secure Certificateless Encryption Schemes Based on {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVSR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  J. Shriram and
                  C. Pandu Rangan},
  title        = {Identity Based Partial Aggregate Signature Scheme Without Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/PatraCRSR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan and
                  Kannan Srinathan and
                  Prasad Raghavendra},
  title        = {Perfectly reliable and secure message transmission tolerating mobile
                  adversary},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {200--224},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023467},
  doi          = {10.1504/IJACT.2009.023467},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/PatraCRSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/NarayananAAPCR09,
  author       = {G. Sathya Narayanan and
                  T. Aishwarya and
                  Anugrah Agrawal and
                  Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Multi Party Distributed Private Matching, Set Disjointness and Cardinality
                  of Set Intersection with Information Theoretic Security},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_2},
  doi          = {10.1007/978-3-642-10433-6\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/NarayananAAPCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SrinathanPCR09,
  author       = {Kannan Srinathan and
                  Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Unconditionally secure message transmission in arbitrary directed
                  synchronous networks tolerating generalized mixed adversary},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {171--182},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533083},
  doi          = {10.1145/1533057.1533083},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SrinathanPCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/SelviVR09,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Cryptanalysis of Certificateless Signcryption Schemes and an Efficient
                  Construction without Pairing},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_6},
  doi          = {10.1007/978-3-642-16342-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/SelviVR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/AgrawalKSR09,
  author       = {Shivank Agrawal and
                  Swarun Kumar and
                  Amjed Shareef and
                  C. Pandu Rangan},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Sanitizable Signatures with Strong Transparency in the Standard Model},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {93--107},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_7},
  doi          = {10.1007/978-3-642-16342-5\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/AgrawalKSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/SelviVNR09,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Shilpi Nayak and
                  C. Pandu Rangan},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Breaking and Building of Threshold Signcryption Schemes},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {108--123},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_8},
  doi          = {10.1007/978-3-642-16342-5\_8},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/SelviVNR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PatraCR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Communication Efficient Statistical Asynchronous Multiparty Computation
                  with Optimal Resilience},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {179--197},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_14},
  doi          = {10.1007/978-3-642-16342-5\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/PatraCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PatraCRR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Tal Rabin and
                  C. Pandu Rangan},
  editor       = {Shai Halevi},
  title        = {The Round Complexity of Verifiable Secret Sharing Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {487--504},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_29},
  doi          = {10.1007/978-3-642-03356-8\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PatraCRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/ChoudharyPASR09,
  author       = {Ashish Choudhary and
                  Arpita Patra and
                  B. V. Ashwinkumar and
                  Kannan Srinathan and
                  C. Pandu Rangan},
  editor       = {Vijay K. Garg and
                  Roger Wattenhofer and
                  Kishore Kothapalli},
  title        = {On Minimal Connectivity Requirement for Secure Message Transmission
                  in Asynchronous Networks},
  booktitle    = {Distributed Computing and Networking, 10th International Conference,
                  {ICDCN} 2009, Hyderabad, India, January 3-6, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5408},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-540-92295-7\_19},
  doi          = {10.1007/978-3-540-92295-7\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/ChoudharyPASR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/PatraCR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Kaoru Kurosawa},
  title        = {Efficient Statistical Asynchronous Verifiable Secret Sharing with
                  Optimal Resilience},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_7},
  doi          = {10.1007/978-3-642-14496-7\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/PatraCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SelviVSKR09,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  J. Shriram and
                  S. Kalaivani and
                  C. Pandu Rangan},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Identity Based Aggregate Signcryption Schemes},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {378--397},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_25},
  doi          = {10.1007/978-3-642-10628-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SelviVSKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PatraCR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Round Efficient Unconditionally Secure {MPC} and Multiparty Set Intersection
                  with Optimal Resilience},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {398--417},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_26},
  doi          = {10.1007/978-3-642-10628-6\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PatraCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SelviVR09,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {On the Security of Identity Based Ring Signcryption Schemes},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {310--325},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_25},
  doi          = {10.1007/978-3-642-04474-8\_25},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/SelviVR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwoca/ReddyKR09,
  author       = {T. V. Thirumala Reddy and
                  D. Sai Krishna and
                  C. Pandu Rangan},
  editor       = {Jir{\'{\i}} Fiala and
                  Jan Kratochv{\'{\i}}l and
                  Mirka Miller},
  title        = {The Guarding Problem - Complexity and Approximation},
  booktitle    = {Combinatorial Algorithms, 20th International Workshop, {IWOCA} 2009,
                  Hradec nad Moravic{\'{\i}}, Czech Republic, June 28-July 2, 2009,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5874},
  pages        = {460--470},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10217-2\_45},
  doi          = {10.1007/978-3-642-10217-2\_45},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwoca/ReddyKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SelviVSR09,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Rahul Srinivasan and
                  Chandrasekaran Pandu Rangan},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {An Efficient Identity-Based Signcryption Scheme for Multiple Receivers},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_6},
  doi          = {10.1007/978-3-642-04846-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SelviVSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/PatraCR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Srikanta Tirthapura and
                  Lorenzo Alvisi},
  title        = {Simple and efficient asynchronous byzantine agreement with optimal
                  resilience},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2009, Calgary, Alberta, Canada, August 10-12, 2009},
  pages        = {92--101},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1582716.1582736},
  doi          = {10.1145/1582716.1582736},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/PatraCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/PatraCR09a,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Srikanta Tirthapura and
                  Lorenzo Alvisi},
  title        = {Brief announcement: perfectly secure message transmission in directed
                  networks re-visited},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2009, Calgary, Alberta, Canada, August 10-12, 2009},
  pages        = {278--279},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1582716.1582763},
  doi          = {10.1145/1582716.1582763},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/PatraCR09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SelviVR09,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Breaking and Fixing of an Identity Based Multi-Signcryption Scheme},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_7},
  doi          = {10.1007/978-3-642-04642-1\_7},
  timestamp    = {Sun, 02 Jun 2019 21:26:38 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/SelviVR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PatraCR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Information Theoretically Secure Multi Party Set Intersection Re-visited},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {71--91},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_5},
  doi          = {10.1007/978-3-642-05445-7\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PatraCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VivekSR09,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {On the Security of Two Ring Signcryption Schemes},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {219--224},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 21:15:22 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VivekSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/VivekSNR09,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  S. Gopi Nath and
                  C. Pandu Rangan},
  editor       = {Yan Chen and
                  Tassos Dimitriou and
                  Jianying Zhou},
  title        = {Breaking and Building of Group Inside Signature},
  booktitle    = {Security and Privacy in Communication Networks - 5th International
                  {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {19},
  pages        = {330--339},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05284-2\_19},
  doi          = {10.1007/978-3-642-05284-2\_19},
  timestamp    = {Sun, 07 Jan 2018 16:56:18 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/VivekSNR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/walcom/BalasubramanianHR09,
  author       = {Balasubramanian Sivan and
                  S. Harini and
                  C. Pandu Rangan},
  editor       = {Sandip Das and
                  Ryuhei Uehara},
  title        = {Core and Conditional Core Path of Specified Length in Special Classes
                  of Graphs},
  booktitle    = {{WALCOM:} Algorithms and Computation, Third International Workshop,
                  {WALCOM} 2009, Kolkata, India, February 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5431},
  pages        = {262--273},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00202-1\_23},
  doi          = {10.1007/978-3-642-00202-1\_23},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/walcom/BalasubramanianHR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VivekSR09,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {{ON} {THE} {SECURITY} {OF} {TWO} {RING} {SIGNCRYPTION} {SCHEMES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VivekSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VivekSSR09,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Deepanshu Shukla and
                  C. Pandu Rangan},
  title        = {Scalable Compilers for Group Key Establishment : Two/Three Party to
                  Group},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VivekSSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR09a,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Information Theoretically Secure Multi Party Set Intersection Re-Visited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR09,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {On the security of Identity Based Ring Signcryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VivekSNR09,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  S. Gopi Nath and
                  C. Pandu Rangan},
  title        = {Breaking and Building of Group Inside Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VivekSNR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR09a,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Breaking and Fixing of an Identity Based Multi-Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVSKR09,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  J. Shriram and
                  S. Kalaivani and
                  C. Pandu Rangan},
  title        = {Security Analysis of Aggregate signature and Batch verification signature
                  schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVSKR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR09b,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Cryptanalysis of Certificateless Signcryption Schemes and an Efficient
                  Construction Without Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR09c,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {A note on the Certificateless Multi-receiver Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR09c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NarayananAAPCR09,
  author       = {G. Sathya Narayanan and
                  T. Aishwarya and
                  Anugrah Agrawal and
                  Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Multi Party Distributed Private Matching, Set Disjointness and Cardinality
                  Set Intersection with Information Theoretic Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NarayananAAPCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NarasimhanVR09,
  author       = {Harikrishna Narasimhan and
                  Venkatanathan Varadarajan and
                  C. Pandu Rangan},
  title        = {Game Theoretic Resistance to Denial of Service Attacks Using Hidden
                  Difficulty Puzzles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NarasimhanVR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraR09,
  author       = {Arpita Patra and
                  C. Pandu Rangan},
  title        = {Communication Optimal Multi-Valued Asynchronous Byzantine Agreement
                  with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR09d,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Certificateless {KEM} and Hybrid Signcryption Schemes Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR09d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR09b,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {On The Communication Complexity of Perfectly Secure Message Transmission
                  in Directed Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/470},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR09c,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty
                  Computation with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR09c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PatraCVR08,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Madhu Vaidyanathan and
                  C. Pandu Rangan},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Efficient Perfectly Reliable and Secure Message Transmission Tolerating
                  Mobile Adversary},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {170--186},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_13},
  doi          = {10.1007/978-3-540-70500-0\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PatraCVR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SrinathanPCR08,
  author       = {Kannan Srinathan and
                  Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Unconditionally Reliable Message Transmission in Directed Hypergraphs},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {285--303},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_21},
  doi          = {10.1007/978-3-540-89641-8\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SrinathanPCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/KirtaneR08,
  author       = {Varad Kirtane and
                  C. Pandu Rangan},
  editor       = {Gregory L. Heileman and
                  Marc Joye},
  title        = {{RSA-TBOS} signcryption with proxy re-encryption},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 27, 2008},
  pages        = {59--66},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456520.1456531},
  doi          = {10.1145/1456520.1456531},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/KirtaneR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/SelviVRJ08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan and
                  Neha Jain},
  editor       = {Cheng{-}Zhong Xu and
                  Minyi Guo},
  title        = {Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption
                  Scheme},
  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
                  {II:} Workshops},
  pages        = {127--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EUC.2008.187},
  doi          = {10.1109/EUC.2008.187},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/SelviVRJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/ShareefR08,
  author       = {Amjed Shareef and
                  C. Pandu Rangan},
  editor       = {Shrisha Rao and
                  Mainak Chatterjee and
                  Prasad Jayanti and
                  C. Siva Ram Murthy and
                  Sanjoy Kumar Saha},
  title        = {On Optimal Probabilistic Asynchronous Byzantine Agreement},
  booktitle    = {Distributed Computing and Networking, 9th International Conference,
                  {ICDCN} 2008, Kolkata, India, January 5-8, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4904},
  pages        = {86--98},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77444-0\_7},
  doi          = {10.1007/978-3-540-77444-0\_7},
  timestamp    = {Mon, 22 May 2023 09:50:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/ShareefR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/ShankarSR08,
  author       = {Bhavani Shankar and
                  Kannan Srinathan and
                  C. Pandu Rangan},
  editor       = {Shrisha Rao and
                  Mainak Chatterjee and
                  Prasad Jayanti and
                  C. Siva Ram Murthy and
                  Sanjoy Kumar Saha},
  title        = {Alternative Protocols for Generalized Oblivious Transfer},
  booktitle    = {Distributed Computing and Networking, 9th International Conference,
                  {ICDCN} 2008, Kolkata, India, January 5-8, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4904},
  pages        = {304--309},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77444-0\_31},
  doi          = {10.1007/978-3-540-77444-0\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/ShankarSR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ChoudharyPASR08,
  author       = {Ashish Choudhary and
                  Arpita Patra and
                  B. V. Ashwinkumar and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Perfectly Reliable and Secure Communication Tolerating Static and
                  Mobile Mixed Adversary},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_15},
  doi          = {10.1007/978-3-540-85093-9\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ChoudharyPASR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PatraCR08,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Dipanwita Roy Chowdhury and
                  Vincent Rijmen and
                  Abhijit Das},
  title        = {Round Efficient Unconditionally Secure Multiparty Computation Protocol},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                  on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5365},
  pages        = {185--199},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89754-5\_15},
  doi          = {10.1007/978-3-540-89754-5\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PatraCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/MalekaSR08,
  author       = {Shaik Maleka and
                  Amjed Shareef and
                  C. Pandu Rangan},
  title        = {The deterministic protocol for rational secret sharing},
  booktitle    = {22nd {IEEE} International Symposium on Parallel and Distributed Processing,
                  {IPDPS} 2008, Miami, Florida USA, April 14-18, 2008},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IPDPS.2008.4536558},
  doi          = {10.1109/IPDPS.2008.4536558},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/MalekaSR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/MalekaSR08,
  author       = {Shaik Maleka and
                  Amjed Shareef and
                  C. Pandu Rangan},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Rational Secret Sharing with Repeated Games},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {334--346},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_24},
  doi          = {10.1007/978-3-540-79104-1\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/MalekaSR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwoca/SivanHC08,
  author       = {Balasubramanian Sivan and
                  S. Harini and
                  C. Pandu Rangan},
  editor       = {Mirka Miller and
                  Koichi Wada},
  title        = {On Conditional Covering Problem},
  booktitle    = {Proceedings of the 19th International Workshop on Combinatorial Algorithms,
                  {IWOCA} 2008, September 13-15, 2008, Nagoya, Japan},
  pages        = {224--238},
  publisher    = {College Publications},
  year         = {2008},
  timestamp    = {Fri, 19 Jan 2024 14:56:10 +0100},
  biburl       = {https://dblp.org/rec/conf/iwoca/SivanHC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/AshwinkumarPCSR08,
  author       = {B. V. Ashwinkumar and
                  Arpita Patra and
                  Ashish Choudhary and
                  Kannan Srinathan and
                  C. Pandu Rangan},
  editor       = {Rida A. Bazzi and
                  Boaz Patt{-}Shamir},
  title        = {On tradeoff between network connectivity, phase complexity and communication
                  complexity of reliable communication tolerating mixed adversary},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2008, Toronto, Canada, August 18-21,
                  2008},
  pages        = {115--124},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1400751.1400768},
  doi          = {10.1145/1400751.1400768},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/AshwinkumarPCSR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/SrinathanCPR08,
  author       = {Kannan Srinathan and
                  Ashish Choudhary and
                  Arpita Patra and
                  C. Pandu Rangan},
  editor       = {Rida A. Bazzi and
                  Boaz Patt{-}Shamir},
  title        = {Efficient single phase unconditionally secure message transmission
                  with optimum communication complexity},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2008, Toronto, Canada, August 18-21,
                  2008},
  pages        = {457},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1400751.1400855},
  doi          = {10.1145/1400751.1400855},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/SrinathanCPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SelviVSC08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Deepanshu Shukla and
                  C. Pandu Rangan},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Efficient and Provably Secure Certificateless Multi-receiver Signcryption},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {52--67},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_4},
  doi          = {10.1007/978-3-540-88733-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/SelviVSC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SelviVKGR08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Naga Naresh Karuturi and
                  Ragavendran Gopalakrishnan and
                  C. Pandu Rangan},
  editor       = {Larry Korba and
                  Stephen Marsh and
                  Reihaneh Safavi{-}Naini},
  title        = {Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption {(IBBSC)}
                  Scheme for Wireless Ad-Hoc Networks},
  booktitle    = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008,
                  October 1-3, 2008, Fredericton, New Brunswick, Canada},
  pages        = {109--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PST.2008.29},
  doi          = {10.1109/PST.2008.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/SelviVKGR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PatraCR08,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Unconditionally Reliable and Secure Message Transmission in Directed
                  Networks Revisited},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {309--326},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_21},
  doi          = {10.1007/978-3-540-85855-3\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PatraCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/ShankarGSR08,
  author       = {Bhavani Shankar and
                  Prasant Gopal and
                  Kannan Srinathan and
                  C. Pandu Rangan},
  editor       = {Shang{-}Hua Teng},
  title        = {Unconditionally reliable message transmission in directed networks},
  booktitle    = {Proceedings of the Nineteenth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2008, San Francisco, California, USA, January 20-22,
                  2008},
  pages        = {1048--1055},
  publisher    = {{SIAM}},
  year         = {2008},
  url          = {http://dl.acm.org/citation.cfm?id=1347082.1347197},
  timestamp    = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/ShankarGSR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SelviVGKR08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Ragavendran Gopalakrishnan and
                  Naga Naresh Karuturi and
                  C. Pandu Rangan},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably
                  Secure ID-Based Broadcast Signcryption {(IBBSC)} Scheme},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_9},
  doi          = {10.1007/978-3-642-00306-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SelviVGKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCGR08,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Madhu Gayatri and
                  C. Pandu Rangan},
  title        = {Efficient Perfectly Reliable and Secure Communication Tolerating Mobile
                  Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCGR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCRS08,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan and
                  Kannan Srinathan},
  title        = {Unconditionally Reliable and Secure Message Transmission in Undirected
                  Synchronous Networks: Possibility, Feasibility and Optimality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCRR08,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Tal Rabin and
                  C. Pandu Rangan},
  title        = {The Round Complexity of Verifiable Secret Sharing Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVGKR08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Ragavendran Gopalakrishnan and
                  Naga Naresh Karuturi and
                  C. Pandu Rangan},
  title        = {Provably Secure ID-Based Broadcast Signcryption {(IBBSC)} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVGKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCASR08,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  B. V. Ashwinkumar and
                  Kannan Srinathan and
                  C. Pandu Rangan},
  title        = {Perfectly Secure Message Transmission Tolerating Mixed Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCASR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVGKR08a,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Ragavendran Gopalakrishnan and
                  Naga Naresh Karuturi and
                  C. Pandu Rangan},
  title        = {On the Provable Security of Multi-Receiver Signcryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVGKR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVKGC08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Naga Naresh Karuturi and
                  Ragavendran Gopalakrishnan and
                  C. Pandu Rangan},
  title        = {Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption {(IBBSC)}
                  Scheme for Wireless Ad-hoc Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVKGC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR08,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan},
  title        = {Statistically Reliable and Secure Message Transmission in Directed
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SKR08,
  author       = {Chandrasekar S. and
                  Ambika K. and
                  C. Pandu Rangan},
  title        = {Signcryption with Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/276},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KaruturiGSC08,
  author       = {Naga Naresh Karuturi and
                  Ragavendran Gopalakrishnan and
                  Rahul Srinivasan and
                  C. Pandu Rangan},
  title        = {Foundations of Group Key Management - Framework, Security Model and
                  a Generic Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KaruturiGSC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirtaneR08,
  author       = {Varad Kirtane and
                  C. Pandu Rangan},
  title        = {{RSA-TBOS} Signcryption with Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirtaneR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVSC08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Rahul Srinivasan and
                  C. Pandu Rangan},
  title        = {An Efficient Identity-Based Signcryption Scheme for Multiple Receivers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVSC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVJC08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Neha Jain and
                  C. Pandu Rangan},
  title        = {Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVJC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirtaneR08a,
  author       = {Varad Kirtane and
                  C. Pandu Rangan},
  title        = {Side Channel Attack Resistant Implementation of Multi-Power {RSA}
                  using Hensel Lifting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirtaneR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SrinathanPCR08,
  author       = {Kannan Srinathan and
                  Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Unconditionally Reliable Message Transmission in Directed Hypergraphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/371},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SrinathanPCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR08a,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Round Efficient Unconditionally Secure Multiparty Computation Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR08b,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan},
  title        = {Efficient Asynchronous Byzantine Agreement with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR08c,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan},
  title        = {Efficient Asynchronous Multiparty Computation with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR08d,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Unconditionally Secure Multiparty Set Intersection Re-Visited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR08d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SrinathanPCR08a,
  author       = {Kannan Srinathan and
                  Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Unconditionally Secure Message Transmission in Arbitrary Directed
                  Synchronous Networks Tolerating Generalized Mixed Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SrinathanPCR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SrinathanRC07,
  author       = {Kannan Srinathan and
                  Prasad Raghavendra and
                  C. Pandu Rangan},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {On Proactive Perfectly Secure Message Transmission},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {461--473},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_33},
  doi          = {10.1007/978-3-540-73458-1\_33},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SrinathanRC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adma/KumarR07,
  author       = {K. Anil Kumar and
                  C. Pandu Rangan},
  editor       = {Reda Alhajj and
                  Hong Gao and
                  Xue Li and
                  Jianzhong Li and
                  Osmar R. Za{\"{\i}}ane},
  title        = {Privacy Preserving {DBSCAN} Algorithm for Clustering},
  booktitle    = {Advanced Data Mining and Applications, Third International Conference,
                  {ADMA} 2007, Harbin, China, August 6-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4632},
  pages        = {57--68},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73871-8\_7},
  doi          = {10.1007/978-3-540-73871-8\_7},
  timestamp    = {Mon, 31 Aug 2020 16:04:32 +0200},
  biburl       = {https://dblp.org/rec/conf/adma/KumarR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adma/PrasadR07,
  author       = {P. Krishna Prasad and
                  C. Pandu Rangan},
  editor       = {Reda Alhajj and
                  Hong Gao and
                  Xue Li and
                  Jianzhong Li and
                  Osmar R. Za{\"{\i}}ane},
  title        = {Privacy Preserving {BIRCH} Algorithm for Clustering over Arbitrarily
                  Partitioned Databases},
  booktitle    = {Advanced Data Mining and Applications, Third International Conference,
                  {ADMA} 2007, Harbin, China, August 6-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4632},
  pages        = {146--157},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73871-8\_15},
  doi          = {10.1007/978-3-540-73871-8\_15},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adma/PrasadR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/PatraSCSR07,
  author       = {Arpita Patra and
                  Bhavani Shankar and
                  Ashish Choudhary and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Perfectly Secure Message Transmission in Directed Networks Tolerating
                  Threshold and Non Threshold Adversary},
  booktitle    = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  pages        = {80--101},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9\_6},
  doi          = {10.1007/978-3-540-76969-9\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/PatraSCSR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmin/PrasadR07,
  author       = {P. Krishna Prasad and
                  C. Pandu Rangan},
  editor       = {Robert Stahlbock and
                  Sven F. Crone and
                  Stefan Lessmann},
  title        = {Privacy Preserving {CACTUS} Algorithm for Clustering over Vertically
                  Partitioned Databases},
  booktitle    = {Proceedings of the 2007 International Conference on Data Mining, {DMIN}
                  2007, June 25-28, 2007, Las Vegas, Nevada, {USA}},
  pages        = {308--314},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Thu, 20 Dec 2007 11:10:11 +0100},
  biburl       = {https://dblp.org/rec/conf/dmin/PrasadR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/VaradarajanVR07,
  author       = {Avinash V. Varadarajan and
                  Ramarathnam Venkatesan and
                  C. Pandu Rangan},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Data structures for limited oblivious execution of programs while
                  preserving locality of reference},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {63--69},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314289},
  doi          = {10.1145/1314276.1314289},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/VaradarajanVR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/SrinathanRK07,
  author       = {K. Srinathan and
                  C. Pandu Rangan and
                  Ranjit Kumaresan},
  editor       = {Yvo Desmedt},
  title        = {On Exponential Lower Bound for Protocols for Reliable Communication
                  in Networks},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {89--98},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_7},
  doi          = {10.1007/978-3-642-10230-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/SrinathanRK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SrinathanPCR07,
  author       = {Kannan Srinathan and
                  Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Probabilistic Perfectly Reliable and Secure Message Transmission -
                  Possibility, Feasibility and Optimality},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {101--122},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_9},
  doi          = {10.1007/978-3-540-77026-8\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SrinathanPCR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/ShareefR07,
  author       = {Amjed Shareef and
                  C. Pandu Rangan},
  editor       = {Hamid R. Arabnia},
  title        = {Efficient Protocol For Approximate Agreement},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 2007, Las Vegas, Nevada,
                  USA, June 25-28, 2007, Volume 1},
  pages        = {193--199},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 09:03:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/ShareefR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/PatraCR07,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Chandrasekaran Pandu Rangan},
  editor       = {Indranil Gupta and
                  Roger Wattenhofer},
  title        = {Constant phase efficient protocols for secure message transmission
                  in directed networks},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2007, Portland, Oregon, USA, August
                  12-15, 2007},
  pages        = {322--323},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1281100.1281153},
  doi          = {10.1145/1281100.1281153},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/PatraCR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SrinathanPR07,
  author       = {Kannan Srinathan and
                  N. R. Prasad and
                  C. Pandu Rangan},
  title        = {On the Optimal Communication Complexity of Multiphase Protocols for
                  Perfect Communication},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {311--320},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.31},
  doi          = {10.1109/SP.2007.31},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SrinathanPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/PatraCSR07,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Kannan Srinathan and
                  C. Pandu Rangan},
  editor       = {Andrzej Pelc},
  title        = {Perfectly Reliable and Secure Communication in Directed Networks Tolerating
                  Mixed Adversary},
  booktitle    = {Distributed Computing, 21st International Symposium, {DISC} 2007,
                  Lemesos, Cyprus, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4731},
  pages        = {496--498},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75142-7\_43},
  doi          = {10.1007/978-3-540-75142-7\_43},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/PatraCSR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2007,
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8},
  doi          = {10.1007/978-3-540-77026-8},
  isbn         = {978-3-540-77025-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/NarayananSR06,
  author       = {Arvind Narayanan and
                  K. Srinathan and
                  C. Pandu Rangan},
  title        = {Perfectly Reliable Message Transmission},
  journal      = {Inf. Process. Lett.},
  volume       = {100},
  number       = {1},
  pages        = {23--28},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ipl.2005.11.027},
  doi          = {10.1016/J.IPL.2005.11.027},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/NarayananSR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChakinalaKMNRS06,
  author       = {R. C. Chakinala and
                  Abishek Kumarasubramanian and
                  R. Manokaran and
                  Guevara Noubir and
                  C. Pandu Rangan and
                  Ravi Sundaram},
  editor       = {Jan Camenisch and
                  Christian S. Collberg and
                  Neil F. Johnson and
                  Phil Sallee},
  title        = {Steganographic Communication in Ordered Channels},
  booktitle    = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria,
                  VA, USA, July 10-12, 2006. Revised Selcted Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4437},
  pages        = {42--57},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74124-4\_4},
  doi          = {10.1007/978-3-540-74124-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChakinalaKMNRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PatraCSR06,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure
                  Message Transmission},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {221--235},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_16},
  doi          = {10.1007/11941378\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PatraCSR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/SrinathanR06,
  author       = {Kannan Srinathan and
                  C. Pandu Rangan},
  editor       = {Eric Ruppert and
                  Dahlia Malkhi},
  title        = {Possibility and complexity of probabilistic reliable communication
                  in directed networks},
  booktitle    = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2006, Denver, CO, USA, July 23-26,
                  2006},
  pages        = {265--274},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1146381.1146421},
  doi          = {10.1145/1146381.1146421},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/SrinathanR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/PrasadR06,
  author       = {P. Krishna Prasad and
                  C. Pandu Rangan},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Privacy Preserving {BIRCH} Algorithm for Clustering over Vertically
                  Partitioned Databases},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {84--99},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_7},
  doi          = {10.1007/11844662\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/PrasadR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaa/ChakinalaKLMRR06,
  author       = {R. C. Chakinala and
                  Abishek Kumarasubramanian and
                  Kofi A. Laing and
                  R. Manokaran and
                  C. Pandu Rangan and
                  Rajmohan Rajaraman},
  editor       = {Phillip B. Gibbons and
                  Uzi Vishkin},
  title        = {Playing push vs pull: models and algorithms for disseminating dynamic
                  data in networks},
  booktitle    = {{SPAA} 2006: Proceedings of the 18th Annual {ACM} Symposium on Parallelism
                  in Algorithms and Architectures, Cambridge, Massachusetts, USA, July
                  30 - August 2, 2006},
  pages        = {244--253},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1148109.1148153},
  doi          = {10.1145/1148109.1148153},
  timestamp    = {Wed, 21 Nov 2018 11:13:10 +0100},
  biburl       = {https://dblp.org/rec/conf/spaa/ChakinalaKLMRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FitziGGRS06,
  author       = {Matthias Fitzi and
                  Juan A. Garay and
                  Shyamnath Gollakota and
                  C. Pandu Rangan and
                  K. Srinathan},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Round-Optimal and Efficient Verifiable Secret Sharing},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {329--342},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_17},
  doi          = {10.1007/11681878\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FitziGGRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SrinathanNR04,
  author       = {K. Srinathan and
                  Arvind Narayanan and
                  C. Pandu Rangan},
  editor       = {Matthew K. Franklin},
  title        = {Optimal Perfectly Secure Message Transmission},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {545--561},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_33},
  doi          = {10.1007/978-3-540-28628-8\_33},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SrinathanNR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/RavikantMSSR04,
  author       = {D. V. S. Ravikant and
                  Muthuramakrishnan Venkitasubramaniam and
                  V. Srikanth and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Soma Chaudhuri and
                  Shay Kutten},
  title        = {Brief announcement: on the round complexity of distributed consensus
                  over synchronous networks},
  booktitle    = {Proceedings of the Twenty-Third Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2004, St. John's, Newfoundland, Canada,
                  July 25-28, 2004},
  pages        = {397},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1011767.1011862},
  doi          = {10.1145/1011767.1011862},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/RavikantMSSR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/RavikantMSSR04,
  author       = {D. V. S. Ravikant and
                  Muthuramakrishnan Venkitasubramaniam and
                  V. Srikanth and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Rachid Guerraoui},
  title        = {On Byzantine Agreement over (2, 3)-Uniform Hypergraphs},
  booktitle    = {Distributed Computing, 18th International Conference, {DISC} 2004,
                  Amsterdam, The Netherlands, October 4-7, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3274},
  pages        = {450--464},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30186-8\_32},
  doi          = {10.1007/978-3-540-30186-8\_32},
  timestamp    = {Wed, 07 Dec 2022 23:11:11 +0100},
  biburl       = {https://dblp.org/rec/conf/wdag/RavikantMSSR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Rangan04,
  author       = {C. Pandu Rangan},
  editor       = {Dinesh P. Mehta and
                  Sartaj Sahni},
  title        = {Skew Heaps},
  booktitle    = {Handbook of Data Structures and Applications},
  publisher    = {Chapman and Hall/CRC},
  year         = {2004},
  url          = {https://doi.org/10.1201/9781420035179.ch6},
  doi          = {10.1201/9781420035179.CH6},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crc/Rangan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Rangan04a,
  author       = {C. Pandu Rangan},
  editor       = {Dinesh P. Mehta and
                  Sartaj Sahni},
  title        = {Randomized Dictionary Structures},
  booktitle    = {Handbook of Data Structures and Applications},
  publisher    = {Chapman and Hall/CRC},
  year         = {2004},
  url          = {https://doi.org/10.1201/9781420035179.ch13},
  doi          = {10.1201/9781420035179.CH13},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crc/Rangan04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NarayananRK03,
  author       = {Arvind Narayanan and
                  C. Pandu Rangan and
                  Kwangjo Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Practical Pay {TV} Schemes},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {192--203},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_17},
  doi          = {10.1007/3-540-45067-X\_17},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NarayananRK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/VinodNSRK03,
  author       = {Vinod Vaikuntanathan and
                  Arvind Narayanan and
                  K. Srinathan and
                  C. Pandu Rangan and
                  Kwangjo Kim},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {On the Power of Computational Secret Sharing},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {162--176},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_12},
  doi          = {10.1007/978-3-540-24582-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/VinodNSRK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/AmitanandSSVR03,
  author       = {S. Amitanand and
                  I. Sanketh and
                  K. Srinathan and
                  Vinod Vaikuntanathan and
                  C. Pandu Rangan},
  editor       = {Elizabeth Borowsky and
                  Sergio Rajsbaum},
  title        = {Distributed consensus in the presence of sectional faults},
  booktitle    = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
                  Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
                  13-16, 2003},
  pages        = {202--210},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/872035.872065},
  doi          = {10.1145/872035.872065},
  timestamp    = {Sun, 10 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/AmitanandSSVR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/SrinathanVR03,
  author       = {K. Srinathan and
                  Vinod Vaikuntanathan and
                  C. Pandu Rangan},
  editor       = {Elizabeth Borowsky and
                  Sergio Rajsbaum},
  title        = {Brief announcement: efficient perfectly secure communication over
                  synchronous networks},
  booktitle    = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
                  Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
                  13-16, 2003},
  pages        = {252},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/872035.872072},
  doi          = {10.1145/872035.872072},
  timestamp    = {Sun, 10 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/SrinathanVR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KumarSR02,
  author       = {M. V. N. Ashwin Kumar and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {497--512},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_37},
  doi          = {10.1007/3-540-45450-0\_37},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KumarSR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SrinathanKR02,
  author       = {K. Srinathan and
                  M. V. N. Ashwin Kumar and
                  C. Pandu Rangan},
  editor       = {Yuliang Zheng},
  title        = {Asynchronous Secure Communication Tolerating Mixed Adversaries},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {224--242},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_14},
  doi          = {10.1007/3-540-36178-2\_14},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SrinathanKR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/SrinathanGKNR02,
  author       = {K. Srinathan and
                  Pranava R. Goundan and
                  M. V. N. Ashwin Kumar and
                  R. Nandakumar and
                  C. Pandu Rangan},
  editor       = {Oscar H. Ibarra and
                  Louxin Zhang},
  title        = {Theory of Equal-Flows in Networks},
  booktitle    = {Computing and Combinatorics, 8th Annual International Conference,
                  {COCOON} 2002, Singapore, August 15-17, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2387},
  pages        = {514--524},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45655-4\_55},
  doi          = {10.1007/3-540-45655-4\_55},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/SrinathanGKNR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PrabhuSR02,
  author       = {B. Prabhu and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Asynchronous Unconditionally Secure Computation: An Efficiency Improvement},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {93--107},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_9},
  doi          = {10.1007/3-540-36231-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PrabhuSR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SrinathanRR02,
  author       = {K. Srinathan and
                  N. Tharani Rajan and
                  C. Pandu Rangan},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Non-perfect Secret Sharing over General Access Structures},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {409--421},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_32},
  doi          = {10.1007/3-540-36231-2\_32},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SrinathanRR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/KumarGSR02,
  author       = {M. V. N. Ashwin Kumar and
                  Pranava R. Goundan and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Aleta Ricciardi},
  title        = {On perfectly secure cmmunication over arbitrary networks},
  booktitle    = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2002, Monterey, California, USA,
                  July 21-24, 2002},
  pages        = {193--202},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/571825.571858},
  doi          = {10.1145/571825.571858},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/KumarGSR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PrabhuSR02,
  author       = {B. Prabhu and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Trading Players for Efficiency in Unconditional Multiparty Computation},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {342--353},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_25},
  doi          = {10.1007/3-540-36413-7\_25},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PrabhuSR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/GuruswamiRCCW01,
  author       = {Venkatesan Guruswami and
                  C. Pandu Rangan and
                  Maw{-}Shang Chang and
                  Gerard J. Chang and
                  C. K. Wong},
  title        = {The K\({}_{\mbox{r}}\)-Packing Problem},
  journal      = {Computing},
  volume       = {66},
  number       = {1},
  pages        = {79--89},
  year         = {2001},
  url          = {https://doi.org/10.1007/s006070170039},
  doi          = {10.1007/S006070170039},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/GuruswamiRCCW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SrinathanRK01,
  author       = {K. Srinathan and
                  C. Pandu Rangan and
                  V. Kamakoti},
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {Toward Optimal Player Weights in Secure Distributed Protocols},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  pages        = {232--241},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3\_22},
  doi          = {10.1007/3-540-45311-3\_22},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SrinathanRK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2001,
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3},
  doi          = {10.1007/3-540-45311-3},
  isbn         = {3-540-43010-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/GuruswamiR00,
  author       = {Venkatesan Guruswami and
                  C. Pandu Rangan},
  title        = {Algorithmic aspects of clique-transversal and clique-independent sets},
  journal      = {Discret. Appl. Math.},
  volume       = {100},
  number       = {3},
  pages        = {183--202},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0166-218X(99)00159-6},
  doi          = {10.1016/S0166-218X(99)00159-6},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/GuruswamiR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ita/KumarR00,
  author       = {D. Arun Kumar and
                  C. Pandu Rangan},
  title        = {Approximation algorithms for the Traveling Salesman Problem with range
                  condition},
  journal      = {{RAIRO} Theor. Informatics Appl.},
  volume       = {34},
  number       = {3},
  pages        = {173--182},
  year         = {2000},
  url          = {https://doi.org/10.1051/ita:2000113},
  doi          = {10.1051/ITA:2000113},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ita/KumarR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jalc/SubramanianTKR00,
  author       = {Lakshminarayanan Subramanian and
                  Muralidhar Talupur and
                  Kamala Krithivasan and
                  C. Pandu Rangan},
  title        = {On the Generative Power of Simple {H} Systems},
  journal      = {J. Autom. Lang. Comb.},
  volume       = {5},
  number       = {4},
  pages        = {457--473},
  year         = {2000},
  url          = {https://doi.org/10.25596/jalc-2000-457},
  doi          = {10.25596/JALC-2000-457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jalc/SubramanianTKR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/order/FelsnerKRW00,
  author       = {Stefan Felsner and
                  Ravi Kant and
                  C. Pandu Rangan and
                  Dorothea Wagner},
  title        = {On the Complexity of Partial Order Properties},
  journal      = {Order},
  volume       = {17},
  number       = {2},
  pages        = {179--193},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1006422023869},
  doi          = {10.1023/A:1006422023869},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/order/FelsnerKRW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SrinathanR00,
  author       = {K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Bimal K. Roy and
                  Eiji Okamoto},
  title        = {Efficient Asynchronous Secure Multiparty Distributed Computation},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
                  in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1977},
  pages        = {117--129},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44495-5\_11},
  doi          = {10.1007/3-540-44495-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SrinathanR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SrinathanR00a,
  author       = {K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Bimal K. Roy and
                  Eiji Okamoto},
  title        = {Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
                  in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1977},
  pages        = {130--142},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44495-5\_12},
  doi          = {10.1007/3-540-44495-5\_12},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SrinathanR00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ArvindR99,
  author       = {A. Arvind and
                  C. Pandu Rangan},
  title        = {Symmetric Min-Max Heap: {A} Simpler Data Structure for Double-Ended
                  Priority Queue},
  journal      = {Inf. Process. Lett.},
  volume       = {69},
  number       = {4},
  pages        = {197--199},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0190(99)00014-9},
  doi          = {10.1016/S0020-0190(99)00014-9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ArvindR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fsttcs/1999,
  editor       = {C. Pandu Rangan and
                  Venkatesh Raman and
                  Ramaswamy Ramanujam},
  title        = {Foundations of Software Technology and Theoretical Computer Science,
                  19th Conference, Chennai, India, December 13-15, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1738},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46691-6},
  doi          = {10.1007/3-540-46691-6},
  isbn         = {3-540-66836-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isaac/1999,
  editor       = {Alok Aggarwal and
                  C. Pandu Rangan},
  title        = {Algorithms and Computation, 10th International Symposium, {ISAAC}
                  '99, Chennai, India, December 16-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1741},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46632-0},
  doi          = {10.1007/3-540-46632-0},
  isbn         = {3-540-66916-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/arscom/RanganPP98,
  author       = {C. Pandu Rangan and
                  K. R. Parthasarathy and
                  V. Prakash},
  title        = {On The g-centroidal Problem in Special Classes of Perfect Graphs},
  journal      = {Ars Comb.},
  volume       = {50},
  year         = {1998},
  timestamp    = {Fri, 09 Jan 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/arscom/RanganPP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/KirkpatrickRRS98,
  author       = {David G. Kirkpatrick and
                  Madhukar K. Reddy and
                  C. Pandu Rangan and
                  Anand Srinivasan},
  title        = {Partial and Perfect Path Covers of Cographs},
  journal      = {Discret. Appl. Math.},
  volume       = {89},
  number       = {1-3},
  pages        = {143--153},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0166-218X(98)00101-2},
  doi          = {10.1016/S0166-218X(98)00101-2},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/KirkpatrickRRS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ChangNR98,
  author       = {Maw{-}Shang Chang and
                  P. Nagavamsi and
                  C. Pandu Rangan},
  title        = {Weighted Irredundance of Interval Graphs},
  journal      = {Inf. Process. Lett.},
  volume       = {66},
  number       = {2},
  pages        = {65--70},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(98)00040-4},
  doi          = {10.1016/S0020-0190(98)00040-4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ChangNR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GuruswamiR98,
  author       = {Venkatesan Guruswami and
                  C. Pandu Rangan},
  title        = {A Natural Family of Optimization Problems with Arbitrarily Small Approximation
                  Thresholds},
  journal      = {Inf. Process. Lett.},
  volume       = {68},
  number       = {5},
  pages        = {241--248},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(98)00169-0},
  doi          = {10.1016/S0020-0190(98)00169-0},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/GuruswamiR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/GrafKLR98,
  author       = {Thomas Graf and
                  V. Kamakoti and
                  N. S. Janaki Latha and
                  C. Pandu Rangan},
  editor       = {Wen{-}Lian Hsu and
                  Ming{-}Yang Kao},
  title        = {The Colored Sector Search Tree: {A} Dynamic Data Structure for Efficient
                  High Dimensional Nearest-Foreign-Neighbor Queries},
  booktitle    = {Computing and Combinatorics, 4th Annual International Conference,
                  {COCOON} '98, Taipei, Taiwan, R.o.C., August 12-14, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1449},
  pages        = {35--44},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-68535-9\_7},
  doi          = {10.1007/3-540-68535-9\_7},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/GrafKLR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swat/SridharRR98,
  author       = {Sridhar Ramachandran and
                  K. Rajasekar and
                  C. Pandu Rangan},
  editor       = {Stefan Arnborg and
                  Lars Ivansson},
  title        = {Probabilistic Data Structures for Priority Queues (Extended Abstract)},
  booktitle    = {Algorithm Theory - {SWAT} '98, 6th Scandinavian Workshop on Algorithm
                  Theory, Stockholm, Sweden, July, 8-10, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1432},
  pages        = {143--154},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054362},
  doi          = {10.1007/BFB0054362},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/swat/SridharRR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wg/GuruswamiRCCW98,
  author       = {Venkatesan Guruswami and
                  C. Pandu Rangan and
                  Maw{-}Shang Chang and
                  Gerard J. Chang and
                  C. K. Wong},
  editor       = {Juraj Hromkovic and
                  Ondrej S{\'{y}}kora},
  title        = {The Vertex-Disjoint Triangles Problem},
  booktitle    = {Graph-Theoretic Concepts in Computer Science, 24th International Workshop,
                  {WG} '98, Smolenice Castle, Slovak Republic, June 18-20, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1517},
  pages        = {26--37},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10692760\_3},
  doi          = {10.1007/10692760\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/wg/GuruswamiRCCW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/VenkatesanRMMR97,
  author       = {G. Venkatesan and
                  Udi Rotics and
                  M. S. Madanlal and
                  Johann A. Makowsky and
                  C. Pandu Rangan},
  title        = {Restrictions of Minimum Spanner Problems},
  journal      = {Inf. Comput.},
  volume       = {136},
  number       = {2},
  pages        = {143--164},
  year         = {1997},
  url          = {https://doi.org/10.1006/inco.1997.2641},
  doi          = {10.1006/INCO.1997.2641},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/VenkatesanRMMR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipc/GrafKLR97,
  author       = {Thomas Graf and
                  V. Kamakoti and
                  N. S. Janaki Latha and
                  C. Pandu Rangan},
  title        = {An optimal parallel algorithm for the all-nearest-foreign-neighbors
                  problem in arbitrary dimensions},
  booktitle    = {Proceedings of the Fourth International on High-Performance Computing,
                  HiPC 1997, Bangalore, India, 18-21 December, 1997},
  pages        = {132--136},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/HIPC.1997.634483},
  doi          = {10.1109/HIPC.1997.634483},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hipc/GrafKLR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/EaswarakumarKRS96,
  author       = {K. S. Easwarakumar and
                  S. V. Krishnan and
                  C. Pandu Rangan and
                  S. Seshadri},
  title        = {Optimal Parallel Algorithm for Finding st-Ambitus of a Planar Biconnected
                  Graph},
  journal      = {Algorithmica},
  volume       = {15},
  number       = {3},
  pages        = {242--255},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF01975868},
  doi          = {10.1007/BF01975868},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/EaswarakumarKRS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/SatyanR96,
  author       = {Satyan R. Coorg and
                  C. Pandu Rangan},
  title        = {The Parity Path Problem on Some Subclasses of Perfect Graphs},
  journal      = {Discret. Appl. Math.},
  volume       = {68},
  number       = {3},
  pages        = {293--302},
  year         = {1996},
  url          = {https://doi.org/10.1016/0166-218X(95)00065-Y},
  doi          = {10.1016/0166-218X(95)00065-Y},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/SatyanR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/BalachandhranR96,
  author       = {V. Balachandhran and
                  C. Pandu Rangan},
  title        = {All-pairs-shortest-length on Strongly Chordal Graphs},
  journal      = {Discret. Appl. Math.},
  volume       = {69},
  number       = {1-2},
  pages        = {169--182},
  year         = {1996},
  url          = {https://doi.org/10.1016/0166-218X(95)00088-9},
  doi          = {10.1016/0166-218X(95)00088-9},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/BalachandhranR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BalachandranNR96,
  author       = {V. Balachandran and
                  P. Nagavamsi and
                  C. Pandu Rangan},
  title        = {Clique Transversal and Clique Independence on Comparability Graphs},
  journal      = {Inf. Process. Lett.},
  volume       = {58},
  number       = {4},
  pages        = {181--184},
  year         = {1996},
  url          = {https://doi.org/10.1016/0020-0190(96)00054-3},
  doi          = {10.1016/0020-0190(96)00054-3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BalachandranNR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MadanlalVR96,
  author       = {M. S. Madanlal and
                  G. Venkatesan and
                  C. Pandu Rangan},
  title        = {Tree 3-Spanners on Interval, Permutation and Regular Bipartite Graphs},
  journal      = {Inf. Process. Lett.},
  volume       = {59},
  number       = {2},
  pages        = {97--102},
  year         = {1996},
  url          = {https://doi.org/10.1016/0020-0190(96)00078-6},
  doi          = {10.1016/0020-0190(96)00078-6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MadanlalVR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AranhaR96,
  author       = {Rohan F. M. Aranha and
                  C. Pandu Rangan},
  title        = {An Efficient Distributed Algorithm for Centering a Spanning Tree of
                  a Biconnected Graph},
  journal      = {Inf. Process. Lett.},
  volume       = {59},
  number       = {3},
  pages        = {145--150},
  year         = {1996},
  url          = {https://doi.org/10.1016/0020-0190(96)00102-0},
  doi          = {10.1016/0020-0190(96)00102-0},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/AranhaR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/VenkatesanR96,
  author       = {G. Venkatesan and
                  C. Pandu Rangan},
  title        = {Approximate Triclique Coloring for Register Allocation},
  journal      = {Inf. Process. Lett.},
  volume       = {60},
  number       = {5},
  pages        = {249--253},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0020-0190(96)00174-3},
  doi          = {10.1016/S0020-0190(96)00174-3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/VenkatesanR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/ChangRC95,
  author       = {Gerard J. Chang and
                  C. Pandu Rangan and
                  Satyan R. Coorg},
  title        = {Weighted Independent Perfect Domination on Cocomparability Graphs},
  journal      = {Discret. Appl. Math.},
  volume       = {63},
  number       = {3},
  pages        = {215--222},
  year         = {1995},
  url          = {https://doi.org/10.1016/0166-218X(94)00067-3},
  doi          = {10.1016/0166-218X(94)00067-3},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/ChangRC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dmgt/GopalakrishnanR95,
  author       = {C. P. Gopalakrishnan and
                  C. Pandu Rangan},
  title        = {Edge-disjoint paths in permutation graphs},
  journal      = {Discuss. Math. Graph Theory},
  volume       = {15},
  number       = {1},
  pages        = {59--72},
  year         = {1995},
  url          = {https://doi.org/10.7151/dmgt.1007},
  doi          = {10.7151/DMGT.1007},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dmgt/GopalakrishnanR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dmgt/GopalakrishnanRC95,
  author       = {C. P. Gopalakrishnan and
                  C. Pandu Rangan and
                  Satyan R. Coorg},
  title        = {Efficient algorithms for minimal disjoint path problems on chordal
                  graphs},
  journal      = {Discuss. Math. Graph Theory},
  volume       = {15},
  number       = {2},
  pages        = {119--145},
  year         = {1995},
  url          = {https://doi.org/10.7151/dmgt.1012},
  doi          = {10.7151/DMGT.1012},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dmgt/GopalakrishnanRC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dmgt/GopalakrishnanR95a,
  author       = {C. P. Gopalakrishnan and
                  C. Pandu Rangan},
  title        = {A linear algorithms for the two paths problem on permutation graphs},
  journal      = {Discuss. Math. Graph Theory},
  volume       = {15},
  number       = {2},
  pages        = {147--166},
  year         = {1995},
  url          = {https://doi.org/10.7151/dmgt.1013},
  doi          = {10.7151/DMGT.1013},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dmgt/GopalakrishnanR95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MaheshMR95,
  author       = {Saptarshi Mahesh and
                  C. Siva Ram Murthy and
                  C. Pandu Rangan},
  title        = {Efficient Dynamic Job Scheduling Algorithms for Multiprocessor Systems},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {78-D},
  number       = {1},
  pages        = {3--12},
  year         = {1995},
  url          = {http://search.ieice.org/bin/summary.php?id=e78-d\_1\_3},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MaheshMR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/MaheshMGR95,
  author       = {Sathi Mahesh and
                  C. Siva Ram Murthy and
                  T. A. Gonsalves and
                  C. Pandu Rangan},
  title        = {Modeling and simulation of dynamic job scheduling in multiprocessor
                  systems},
  journal      = {Int. J. Comput. Math.},
  volume       = {58},
  number       = {3-4},
  pages        = {221--247},
  year         = {1995},
  url          = {https://doi.org/10.1080/00207169508804445},
  doi          = {10.1080/00207169508804445},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/MaheshMGR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/SrinivasanMNRC95,
  author       = {Anand Srinivasan and
                  K. Madhukar and
                  P. Nagavamsi and
                  C. Pandu Rangan and
                  Maw{-}Shang Chang},
  title        = {Edge Domination on Bipartite Permutation Graphs and Cotriangulated
                  Graphs},
  journal      = {Inf. Process. Lett.},
  volume       = {56},
  number       = {3},
  pages        = {165--171},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(95)94093-8},
  doi          = {10.1016/0020-0190(95)94093-8},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/SrinivasanMNRC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ita/BalayoganR95,
  author       = {V. B. Balayogan and
                  C. Pandu Rangan},
  title        = {Parallel Algorithms on Interval Graphs},
  journal      = {{RAIRO} Theor. Informatics Appl.},
  volume       = {29},
  number       = {6},
  pages        = {451--470},
  year         = {1995},
  url          = {https://doi.org/10.1051/ita/1995290604511},
  doi          = {10.1051/ITA/1995290604511},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ita/BalayoganR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/ArvindKR95,
  author       = {K. Arvind and
                  V. Kamakoti and
                  C. Pandu Rangan},
  title        = {Efficient Parallel Algorithms for Permutation Graphs},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {26},
  number       = {1},
  pages        = {116--124},
  year         = {1995},
  url          = {https://doi.org/10.1006/jpdc.1995.1052},
  doi          = {10.1006/JPDC.1995.1052},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/ArvindKR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/AranhaR95,
  author       = {Rohan F. M. Aranha and
                  C. Pandu Rangan},
  title        = {An Efficient Distributed Algorithm For st-numbering The Verices Of
                  {A} Biconnected Graph},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {1},
  number       = {9},
  pages        = {633--650},
  year         = {1995},
  url          = {https://doi.org/10.3217/jucs-001-09-0633},
  doi          = {10.3217/JUCS-001-09-0633},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/AranhaR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/networks/CoorgR95,
  author       = {Satyan R. Coorg and
                  C. Pandu Rangan},
  title        = {Feedback vertex set on cocomparability graphs},
  journal      = {Networks},
  volume       = {26},
  number       = {2},
  pages        = {101--111},
  year         = {1995},
  url          = {https://doi.org/10.1002/net.3230260205},
  doi          = {10.1002/NET.3230260205},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/networks/CoorgR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/njc/KamakotiKR95,
  author       = {V. Kamakoti and
                  Kamala Krithivasan and
                  C. Pandu Rangan},
  title        = {An Efficient Randomized Algorithm for the Closest Pair Problem on
                  Colored Point Sets},
  journal      = {Nord. J. Comput.},
  volume       = {2},
  number       = {1},
  pages        = {28--40},
  year         = {1995},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/njc/KamakotiKR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/MaheshMR95,
  author       = {Sathi Mahesh and
                  C. Siva Ram Murthy and
                  C. Pandu Rangan},
  title        = {Performance Bounds for Static Multiprocessor Scheduling of Multi-Task
                  Jobs},
  journal      = {Parallel Process. Lett.},
  volume       = {5},
  pages        = {343--355},
  year         = {1995},
  url          = {https://doi.org/10.1142/S0129626495000321},
  doi          = {10.1142/S0129626495000321},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppl/MaheshMR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/MadhukarKRS95,
  author       = {K. Madhukar and
                  D. Pavan Kumar and
                  C. Pandu Rangan and
                  R. Sundar},
  title        = {Systematic Design of an Algorithm for Biconnected Components},
  journal      = {Sci. Comput. Program.},
  volume       = {25},
  number       = {1},
  pages        = {63--77},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-6423(95)00005-D},
  doi          = {10.1016/0167-6423(95)00005-D},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/MadhukarKRS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SrikrishnaR95,
  author       = {G. Srikrishna and
                  C. Pandu Rangan},
  title        = {Optimal Parallel Algorithms for Path Problems on Planar Graphs},
  journal      = {Theor. Comput. Sci.},
  volume       = {145},
  number       = {1{\&}2},
  pages        = {27--43},
  year         = {1995},
  url          = {https://doi.org/10.1016/0304-3975(94)00189-P},
  doi          = {10.1016/0304-3975(94)00189-P},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/SrikrishnaR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/KamakotiKR95,
  author       = {V. Kamakoti and
                  Kamala Krithivasan and
                  C. Pandu Rangan},
  editor       = {Ding{-}Zhu Du and
                  Ming Li},
  title        = {Efficient Randomized Incremental Algorithm For The Closest Pair Problem
                  Using Leafary Trees},
  booktitle    = {Computing and Combinatorics, First Annual International Conference,
                  {COCOON} '95, Xi'an, China, August 24-26, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {959},
  pages        = {71--80},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0030821},
  doi          = {10.1007/BFB0030821},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/KamakotiKR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/EaswarakumarRC94,
  author       = {K. S. Easwarakumar and
                  C. Pandu Rangan and
                  Grant A. Cheston},
  title        = {A Linear Algorithm for Centering a Spanning Tree of a Biconnected
                  Graph},
  journal      = {Inf. Process. Lett.},
  volume       = {51},
  number       = {3},
  pages        = {121--124},
  year         = {1994},
  url          = {https://doi.org/10.1016/0020-0190(94)00066-2},
  doi          = {10.1016/0020-0190(94)00066-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/EaswarakumarRC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/NivatRRSS94,
  author       = {Maurice Nivat and
                  G. D. S. Ramkumar and
                  C. Pandu Rangan and
                  Ahmed Saoudi and
                  Ravi Sundaram},
  title        = {Efficient Parallel Shuffle Recognition},
  journal      = {Parallel Process. Lett.},
  volume       = {4},
  pages        = {455--463},
  year         = {1994},
  url          = {https://doi.org/10.1142/S0129626494000429},
  doi          = {10.1142/S0129626494000429},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppl/NivatRRSS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/SundaramSR94,
  author       = {Ravi Sundaram and
                  Karan Sher Singh and
                  C. Pandu Rangan},
  title        = {Treewidth of Circular-Arc Graphs},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {7},
  number       = {4},
  pages        = {647--655},
  year         = {1994},
  url          = {https://doi.org/10.1137/S0895480191193789},
  doi          = {10.1137/S0895480191193789},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/SundaramSR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/MohanKR94,
  author       = {P. Jagan Mohan and
                  V. Kamakoti and
                  C. Pandu Rangan},
  editor       = {Bj{\"{o}}rn Pehrson and
                  Imre Simon},
  title        = {Efficient Randomized Parallel Algorithm for the Closest Pair Problem
                  in D-dimension},
  booktitle    = {Technology and Foundations - Information Processing '94, Volume 1,
                  Proceedings of the {IFIP} 13th World Computer Congress, Hamburg, Germany,
                  28 August - 2 September, 1994},
  series       = {{IFIP} Transactions},
  volume       = {{A-51}},
  pages        = {547--552},
  publisher    = {North-Holland},
  year         = {1994},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/MohanKR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/GopalakrishnanR94,
  author       = {C. P. Gopalakrishnan and
                  C. Pandu Rangan},
  editor       = {Ding{-}Zhu Du and
                  Xiang{-}Sun Zhang},
  title        = {Edge-Disjoint Paths in Permutation Graphs},
  booktitle    = {Algorithms and Computation, 5th International Symposium, {ISAAC} '94,
                  Beijing, P. R. China, August 25-27, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {834},
  pages        = {208--216},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58325-4\_183},
  doi          = {10.1007/3-540-58325-4\_183},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/GopalakrishnanR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/RanganC94,
  author       = {C. Pandu Rangan and
                  Maw{-}Shang Chang},
  editor       = {Ding{-}Zhu Du and
                  Xiang{-}Sun Zhang},
  title        = {Weighted Irredundance of Interval Graphs},
  booktitle    = {Algorithms and Computation, 5th International Symposium, {ISAAC} '94,
                  Beijing, P. R. China, August 25-27, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {834},
  pages        = {567--574},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58325-4\_224},
  doi          = {10.1007/3-540-58325-4\_224},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/RanganC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/RamprasadR93,
  author       = {P. B. Ramprasad and
                  C. Pandu Rangan},
  title        = {A Linear Algorithm for the All-Bidirectional-Edges Problem on Planar
                  Graphs},
  journal      = {Algorithmica},
  volume       = {9},
  number       = {3},
  pages        = {199--216},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01190896},
  doi          = {10.1007/BF01190896},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/RamprasadR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/RamanR93,
  author       = {Arjun Raman and
                  C. Pandu Rangan},
  title        = {A Unified Approach to Parallel Algorithms for the Domatic Partition
                  Problem on Special Classes of Perfect Graphs},
  journal      = {Parallel Process. Lett.},
  volume       = {3},
  pages        = {233--241},
  year         = {1993},
  url          = {https://doi.org/10.1142/S0129626493000277},
  doi          = {10.1142/S0129626493000277},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppl/RamanR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SrikantSSR93,
  author       = {R. Srikant and
                  Ravi Sundaram and
                  Karan Sher Singh and
                  C. Pandu Rangan},
  title        = {Optimal Path Cover Problem on Block Graphs and Bipartite Permutation
                  Graphs},
  journal      = {Theor. Comput. Sci.},
  volume       = {115},
  number       = {2},
  pages        = {351--357},
  year         = {1993},
  url          = {https://doi.org/10.1016/0304-3975(93)90123-B},
  doi          = {10.1016/0304-3975(93)90123-B},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/SrikantSSR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/ChangRC93,
  author       = {Gerard J. Chang and
                  C. Pandu Rangan and
                  Satyan R. Coorg},
  editor       = {Kam{-}Wing Ng and
                  Prabhakar Raghavan and
                  N. V. Balasubramanian and
                  Francis Y. L. Chin},
  title        = {Weighted Independent Perfect Domination on Cocomparability Graphs},
  booktitle    = {Algorithms and Computation, 4th International Symposium, {ISAAC} '93,
                  Hong Kong, December 15-17, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {762},
  pages        = {506--514},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57568-5\_282},
  doi          = {10.1007/3-540-57568-5\_282},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/ChangRC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wads/BalakrishnanRR93,
  author       = {Hari Balakrishnan and
                  Anand Rajaraman and
                  C. Pandu Rangan},
  editor       = {Frank K. H. A. Dehne and
                  J{\"{o}}rg{-}R{\"{u}}diger Sack and
                  Nicola Santoro and
                  Sue Whitesides},
  title        = {Connected Domination and Steiner Set on Asteroidal Triple-Free Graphs},
  booktitle    = {Algorithms and Data Structures, Third Workshop, {WADS} '93, Montr{\'{e}}al,
                  Canada, August 11-13, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {709},
  pages        = {131--141},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57155-8\_242},
  doi          = {10.1007/3-540-57155-8\_242},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wads/BalakrishnanRR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/RanganG92,
  author       = {C. Pandu Rangan and
                  Ramesh Govindan},
  title        = {An O(n log n) algorithm for a maxmin location problem},
  journal      = {Discret. Appl. Math.},
  volume       = {36},
  number       = {2},
  pages        = {203--205},
  year         = {1992},
  url          = {https://doi.org/10.1016/0166-218X(92)90234-2},
  doi          = {10.1016/0166-218X(92)90234-2},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/RanganG92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/MaratheRR92,
  author       = {Madhav V. Marathe and
                  R. Ravi and
                  C. Pandu Rangan},
  title        = {Generalized Vertex Covering in Interval Graphs},
  journal      = {Discret. Appl. Math.},
  volume       = {39},
  number       = {1},
  pages        = {87--93},
  year         = {1992},
  url          = {https://doi.org/10.1016/0166-218X(92)90116-R},
  doi          = {10.1016/0166-218X(92)90116-R},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/MaratheRR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KamakotiR92,
  author       = {V. Kamakoti and
                  C. Pandu Rangan},
  title        = {An Optimal Algorithm for Reconstructing a Binary Tree},
  journal      = {Inf. Process. Lett.},
  volume       = {42},
  number       = {2},
  pages        = {113--115},
  year         = {1992},
  url          = {https://doi.org/10.1016/0020-0190(92)90099-H},
  doi          = {10.1016/0020-0190(92)90099-H},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/KamakotiR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/networks/RaviMR92,
  author       = {R. Ravi and
                  Madhav V. Marathe and
                  C. Pandu Rangan},
  title        = {An optimal algorithm to solve the all-pair shortest path problem on
                  interval graphs},
  journal      = {Networks},
  volume       = {22},
  number       = {1},
  pages        = {21--35},
  year         = {1992},
  url          = {https://doi.org/10.1002/net.3230220103},
  doi          = {10.1002/NET.3230220103},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/networks/RaviMR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/SaoudiNRSR92,
  author       = {Ahmed Saoudi and
                  Maurice Nivat and
                  C. Pandu Rangan and
                  Ravi Sundaram and
                  G. D. S. Ramkumar},
  editor       = {Viktor K. Prasanna and
                  Larry H. Canter},
  title        = {A Parallel Algorithm for Recognizing the Shuffle of Two Strings},
  booktitle    = {Proceedings of the 6th International Parallel Processing Symposium,
                  Beverly Hills, CA, USA, March 1992},
  pages        = {112--115},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/IPPS.1992.223062},
  doi          = {10.1109/IPPS.1992.223062},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/SaoudiNRSR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bit/ArikatiRM91,
  author       = {Srinivasa Rao Arikati and
                  C. Pandu Rangan and
                  Glenn K. Manacher},
  title        = {Efficient Reduction for Path Problems on Circular-Arc Graphs},
  journal      = {{BIT}},
  volume       = {31},
  number       = {2},
  pages        = {181--193},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF01931279},
  doi          = {10.1007/BF01931279},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bit/ArikatiRM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/ArikatiR91,
  author       = {Srinivasa Rao Arikati and
                  C. Pandu Rangan},
  title        = {An efficient algorithm for finding a two-pair, and its applications},
  journal      = {Discret. Appl. Math.},
  volume       = {31},
  number       = {1},
  pages        = {71--74},
  year         = {1991},
  url          = {https://doi.org/10.1016/0166-218X(91)90033-S},
  doi          = {10.1016/0166-218X(91)90033-S},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/ArikatiR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/MaheshPS91,
  author       = {R. Mahesh and
                  C. Pandu Rangan and
                  Aravind Srinivasan},
  title        = {On Finding the Minimum Bandwidth of Interval Graphs},
  journal      = {Inf. Comput.},
  volume       = {95},
  number       = {2},
  pages        = {218--224},
  year         = {1991},
  url          = {https://doi.org/10.1016/0890-5401(91)90045-4},
  doi          = {10.1016/0890-5401(91)90045-4},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/MaheshPS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SrinivasanR91,
  author       = {Aravind Srinivasan and
                  C. Pandu Rangan},
  title        = {Efficient Algorithms for the Minimum Weighted Dominating Clique Problem
                  on Permutation Graphs},
  journal      = {Theor. Comput. Sci.},
  volume       = {91},
  number       = {1},
  pages        = {1--21},
  year         = {1991},
  url          = {https://doi.org/10.1016/0304-3975(91)90265-4},
  doi          = {10.1016/0304-3975(91)90265-4},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/SrinivasanR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wads/SundaramSR91,
  author       = {Ravi Sundaram and
                  Karan Sher Singh and
                  C. Pandu Rangan},
  editor       = {Frank K. H. A. Dehne and
                  J{\"{o}}rg{-}R{\"{u}}diger Sack and
                  Nicola Santoro},
  title        = {Treewidth of Circular-Arc Graphs (Abstract)},
  booktitle    = {Algorithms and Data Structures, 2nd Workshop {WADS} '91, Ottawa, Canada,
                  August 14-16, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {519},
  pages        = {41},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/BFb0028248},
  doi          = {10.1007/BFB0028248},
  timestamp    = {Fri, 17 Jul 2020 16:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wads/SundaramSR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/SudarshanR90,
  author       = {S. Sudarshan and
                  C. Pandu Rangan},
  title        = {A Fast Algorithm for Computing Sparse Visibility Graphs},
  journal      = {Algorithmica},
  volume       = {5},
  number       = {2},
  pages        = {210--214},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF01840385},
  doi          = {10.1007/BF01840385},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/SudarshanR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/RamalingamR90,
  author       = {G. Ramalingam and
                  C. Pandu Rangan},
  title        = {New Sequential and Parallel Algorithms for Interval Graph Recognition},
  journal      = {Inf. Process. Lett.},
  volume       = {34},
  number       = {4},
  pages        = {215--219},
  year         = {1990},
  url          = {https://doi.org/10.1016/0020-0190(90)90163-R},
  doi          = {10.1016/0020-0190(90)90163-R},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/RamalingamR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ArikatiR90,
  author       = {Srinivasa Rao Arikati and
                  C. Pandu Rangan},
  title        = {Linear Algorithm for Optimal Path Cover Problem on Interval Graphs},
  journal      = {Inf. Process. Lett.},
  volume       = {35},
  number       = {3},
  pages        = {149--153},
  year         = {1990},
  url          = {https://doi.org/10.1016/0020-0190(90)90064-5},
  doi          = {10.1016/0020-0190(90)90064-5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ArikatiR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/RamkumarR90,
  author       = {G. D. S. Ramkumar and
                  C. Pandu Rangan},
  editor       = {Pen{-}Chung Yew},
  title        = {Parallel Algorithms on Interval Graphs},
  booktitle    = {Proceedings of the 1990 International Conference on Parallel Processing,
                  Urbana-Champaign, IL, USA, August 1990. Volume 3: Algorithms and Applications},
  pages        = {72--74},
  publisher    = {Pennsylvania State University Press},
  year         = {1990},
  timestamp    = {Mon, 15 Jun 2015 19:00:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icpp/RamkumarR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/RaoR89,
  author       = {A. Srinivasa Rao and
                  C. Pandu Rangan},
  title        = {Linear Algorithm for Domatic Number Problem on Interval Graphs},
  journal      = {Inf. Process. Lett.},
  volume       = {33},
  number       = {1},
  pages        = {29--33},
  year         = {1989},
  url          = {https://doi.org/10.1016/0020-0190(89)90184-1},
  doi          = {10.1016/0020-0190(89)90184-1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/RaoR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/RaoR89a,
  author       = {A. Srinivasa Rao and
                  C. Pandu Rangan},
  title        = {Optimal Parallel Algorithms on Circular-Arc Graphs},
  journal      = {Inf. Process. Lett.},
  volume       = {33},
  number       = {3},
  pages        = {147--156},
  year         = {1989},
  url          = {https://doi.org/10.1016/0020-0190(89)90195-6},
  doi          = {10.1016/0020-0190(89)90195-6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/RaoR89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ita/VenkatasubramanianKR89,
  author       = {Suresh Venkatasubramanian and
                  Kamala Krithivasan and
                  C. Pandu Rangan},
  title        = {Algorithms for Weighted Graph Problems on The Modified Cellular Graph
                  Automaton},
  journal      = {{RAIRO} Theor. Informatics Appl.},
  volume       = {23},
  number       = {3},
  pages        = {251--279},
  year         = {1989},
  url          = {https://doi.org/10.1051/ita/1989230302511},
  doi          = {10.1051/ITA/1989230302511},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ita/VenkatasubramanianKR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/RaoR89,
  author       = {A. Srinivasa Rao and
                  C. Pandu Rangan},
  editor       = {C. E. Veni Madhavan},
  title        = {Optimal Parallel Algorithms on Circular-Arc Graphs},
  booktitle    = {Foundations of Software Technology and Theoretical Computer Science,
                  Ninth Conference, Bangalore, India, December 19-21, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {405},
  pages        = {44--55},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-52048-1\_31},
  doi          = {10.1007/3-540-52048-1\_31},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/RaoR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wads/RaoR89,
  author       = {A. Srinivasa Rao and
                  C. Pandu Rangan},
  editor       = {Frank K. H. A. Dehne and
                  J{\"{o}}rg{-}R{\"{u}}diger Sack and
                  Nicola Santoro},
  title        = {Linear Algorithms for Parity Path and Two Path Problems on Circular-Arc
                  Graph},
  booktitle    = {Algorithms and Data Structures, Workshop {WADS} '89, Ottawa, Canada,
                  August 17-19, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {382},
  pages        = {267--290},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-51542-9\_24},
  doi          = {10.1007/3-540-51542-9\_24},
  timestamp    = {Fri, 17 Jul 2020 16:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wads/RaoR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/RamalingamR88,
  author       = {G. Ramalingam and
                  C. Pandu Rangan},
  title        = {Total Domination in Interval Graphs Revisited},
  journal      = {Inf. Process. Lett.},
  volume       = {27},
  number       = {1},
  pages        = {17--21},
  year         = {1988},
  url          = {https://doi.org/10.1016/0020-0190(88)90076-2},
  doi          = {10.1016/0020-0190(88)90076-2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/RamalingamR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/RamalingamR88a,
  author       = {G. Ramalingam and
                  C. Pandu Rangan},
  title        = {A Unified Approach to Domination Problems on Interval Graphs},
  journal      = {Inf. Process. Lett.},
  volume       = {27},
  number       = {5},
  pages        = {271--274},
  year         = {1988},
  url          = {https://doi.org/10.1016/0020-0190(88)90091-9},
  doi          = {10.1016/0020-0190(88)90091-9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/RamalingamR88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/KrishnanRS88,
  author       = {S. V. Krishnan and
                  C. Pandu Rangan and
                  S. Seshadri},
  editor       = {Kesav V. Nori and
                  Sanjeev Kumar},
  title        = {A New Linear Algorithm for the Two Path Problem on Chordal Graphs},
  booktitle    = {Foundations of Software Technology and Theoretical Computer Science,
                  Eighth Conference, Pune, India, December 21-23, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {338},
  pages        = {49--66},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-50517-2\_70},
  doi          = {10.1007/3-540-50517-2\_70},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/KrishnanRS88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acta/KumarR87,
  author       = {S. Kiran Kumar and
                  C. Pandu Rangan},
  title        = {A Linear Space Algorithm for the {LCS} Problem},
  journal      = {Acta Informatica},
  volume       = {24},
  number       = {3},
  pages        = {353--362},
  year         = {1987},
  url          = {https://doi.org/10.1007/BF00265993},
  doi          = {10.1007/BF00265993},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acta/KumarR87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/PrasadP87,
  author       = {T. Hari Krishna Prasad and
                  C. Pandurangan},
  title        = {New Parallel Algorithms for the Maximum Empty Rectangle Problem},
  booktitle    = {International Conference on Parallel Processing, ICPP'87, University
                  Park, PA, USA, August 1987},
  pages        = {286--288},
  publisher    = {Pennsylvania State University Press},
  year         = {1987},
  timestamp    = {Mon, 28 Jul 2014 17:06:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icpp/PrasadP87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wg/GovindanR87,
  author       = {Ramesh Govindan and
                  C. Pandu Rangan},
  editor       = {Herbert G{\"{o}}ttler and
                  Hans J{\"{u}}rgen Schneider},
  title        = {Competitive Location in the L\({}_{\mbox{1}}\) and L\({}_{\mbox{INF}}\)
                  Metrics},
  booktitle    = {Graph-Theoretic Concepts in Computer Science, International Workshop,
                  {WG} '87, Kloster Banz/Staffelstein, Germany, June 29 - July 1, 1987,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {314},
  pages        = {70--83},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-19422-3\_6},
  doi          = {10.1007/3-540-19422-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/wg/GovindanR87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wg/DewanganR86,
  author       = {Ramesh Dewangan and
                  C. Pandu Rangan},
  editor       = {Gottfried Tinhofer and
                  Gunther Schmidt},
  title        = {A Simple Implementation of Warshall's Algorithm on a {VLSI} Chip},
  booktitle    = {Graphtheoretic Concepts in Computer Science, International Workshop,
                  {WG} '86, Bernried, Germany, June 17-19, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {246},
  pages        = {131--145},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-17218-1\_55},
  doi          = {10.1007/3-540-17218-1\_55},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/wg/DewanganR86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/Rangan83,
  author       = {C. Pandu Rangan},
  title        = {On the Minimum Number of Additions Required to Compute a Quadratic
                  Form},
  journal      = {J. Algorithms},
  volume       = {4},
  number       = {3},
  pages        = {282--285},
  year         = {1983},
  url          = {https://doi.org/10.1016/0196-6774(83)90027-5},
  doi          = {10.1016/0196-6774(83)90027-5},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jal/Rangan83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics