Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: C. Pandu Rangan
@inproceedings{DBLP:conf/cans/ChakrabortyKOR23, author = {Suvradip Chakraborty and Harish Karthikeyan and Adam O'Neill and C. Pandu Rangan}, editor = {Jing Deng and Vladimir Kolesnikov and Alexander A. Schwarzmann}, title = {Forward Security Under Leakage Resilience, Revisited}, booktitle = {Cryptology and Network Security - 22nd International Conference, {CANS} 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14342}, pages = {3--27}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7563-1\_1}, doi = {10.1007/978-981-99-7563-1\_1}, timestamp = {Thu, 09 Nov 2023 15:01:06 +0100}, biburl = {https://dblp.org/rec/conf/cans/ChakrabortyKOR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VivekSVR23, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Ramarathnam Venkatesan and C. Pandu Rangan}, title = {Compact Identity Based Encryption Based on n{\^{}}\{th\} - Residuosity Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {931}, year = {2023}, url = {https://eprint.iacr.org/2023/931}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VivekSVR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SinghRSA21, author = {Kunwar Singh and C. Pandu Rangan and Samir Sheshank and Richa Agrawal}, title = {Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes}, journal = {{IET} Inf. Secur.}, volume = {15}, number = {1}, pages = {1--12}, year = {2021}, url = {https://doi.org/10.1049/ise2.12000}, doi = {10.1049/ISE2.12000}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/SinghRSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcmcst/ChakrabortyRR21, author = {Suvradip Chakraborty and Y. Sreenivasa Rao and C. Pandu Rangan}, title = {Efficient single round attribute-based authenticated key exchange protocol}, journal = {Int. J. Comput. Math. Comput. Syst. Theory}, volume = {6}, number = {4}, pages = {313--336}, year = {2021}, url = {https://doi.org/10.1080/23799927.2021.1873192}, doi = {10.1080/23799927.2021.1873192}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcmcst/ChakrabortyRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/PaulSR21, author = {Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing}, journal = {J. Internet Serv. Inf. Secur.}, volume = {11}, number = {2}, pages = {1--21}, year = {2021}, url = {https://doi.org/10.22667/JISIS.2021.05.31.001}, doi = {10.22667/JISIS.2021.05.31.001}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/PaulSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/DuttaPORS21, author = {Sabyasachi Dutta and Arinjita Paul and Rocki H. Ozaki and C. Pandu Rangan and Kouichi Sakurai}, title = {A Distributed Ledger Management Mechanism for Storing and Selling Private Data}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346258}, doi = {10.1109/DSC49826.2021.9346258}, timestamp = {Wed, 17 Feb 2021 11:46:28 +0100}, biburl = {https://dblp.org/rec/conf/desec/DuttaPORS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SinghRAS20, author = {Kunwar Singh and C. Pandu Rangan and Richa Agrawal and Samir Sheshank}, title = {Provably secure lattice based identity based unidirectional {PRE} and {PRE+} schemes}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102569}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102569}, doi = {10.1016/J.JISA.2020.102569}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SinghRAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/PaulWSR20, author = {Arinjita Paul and Lihua Wang and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {Non-transferability in Proxy Re-Encryption Revisited}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {3}, pages = {1--30}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.08.31.001}, doi = {10.22667/JISIS.2020.08.31.001}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/PaulWSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/ChakrabortyAR20, author = {Suvradip Chakraborty and Janaka Alawatugoda and Chandrasekaran Pandu Rangan}, title = {New approach to practical leakage-resilient public-key cryptography}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {172--201}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0014}, doi = {10.1515/JMC-2019-0014}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/ChakrabortyAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/GopalakrishnanK20, author = {Ragavendran Gopalakrishnan and Dimitrios Kanoulas and Naga Naresh Karuturi and C. Pandu Rangan and Rajmohan Rajaraman and Ravi Sundaram}, title = {Cache Me if You Can: Capacitated Selfish Replication Games in Networks}, journal = {Theory Comput. Syst.}, volume = {64}, number = {2}, pages = {272--310}, year = {2020}, url = {https://doi.org/10.1007/s00224-019-09939-7}, doi = {10.1007/S00224-019-09939-7}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mst/GopalakrishnanK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/AdhikariSPR20, author = {Maneesh Babu Adhikari and Vorapong Suppakitpaisarn and Arinjita Paul and C. Pandu Rangan}, editor = {Sriram Chellappan and Kim{-}Kwang Raymond Choo and NhatHai Phan}, title = {Two-Stage Framework for Accurate and Differentially Private Network Information Publication}, booktitle = {Computational Data and Social Networks - 9th International Conference, CSoNet 2020, Dallas, TX, USA, December 11-13, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12575}, pages = {267--279}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66046-8\_22}, doi = {10.1007/978-3-030-66046-8\_22}, timestamp = {Wed, 06 Jan 2021 16:35:18 +0100}, biburl = {https://dblp.org/rec/conf/csonet/AdhikariSPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PaulSR20, author = {Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {644--665}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_29}, doi = {10.1007/978-3-030-65277-7\_29}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PaulSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/PaulSBR20, author = {Arinjita Paul and Vorapong Suppakitpaisarn and Mitali Bafna and C. Pandu Rangan}, title = {Improving Accuracy of Differentially Private Kronecker Social Networks via Graph Clustering}, booktitle = {2020 International Symposium on Networks, Computers and Communications, {ISNCC} 2020, Montreal, QC, Canada, October 20-22, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISNCC49221.2020.9297349}, doi = {10.1109/ISNCC49221.2020.9297349}, timestamp = {Fri, 15 Jan 2021 09:21:28 +0100}, biburl = {https://dblp.org/rec/conf/isncc/PaulSBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyKOR20, author = {Suvradip Chakraborty and Harish Karthikeyan and Adam O'Neill and C. Pandu Rangan}, title = {Forward-Security Under Continual Leakage with Deterministic Key Updates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {736}, year = {2020}, url = {https://eprint.iacr.org/2020/736}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyKOR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/KumarKR19, author = {Mehul Kumar and Amit Kumar and C. Pandu Rangan}, editor = {Ding{-}Zhu Du and Zhenhua Duan and Cong Tian}, title = {Reoptimization of Path Vertex Cover Problem}, booktitle = {Computing and Combinatorics - 25th International Conference, {COCOON} 2019, Xi'an, China, July 29-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11653}, pages = {363--374}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26176-4\_30}, doi = {10.1007/978-3-030-26176-4\_30}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/KumarKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ChakrabortyR19, author = {Suvradip Chakraborty and C. Pandu Rangan}, editor = {Mitsuru Matsui}, title = {Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {23--43}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_2}, doi = {10.1007/978-3-030-12612-4\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ChakrabortyR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dappcon/SelviPRDB19, author = {S. Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan and Siva Dirisala and Saswata Basu}, title = {Splitting and Aggregating Signatures in Cryptocurrency Protocols}, booktitle = {{IEEE} International Conference on Decentralized Applications and Infrastructures, {DAPPCON} 2019, Newark, CA, USA, April 4-9, 2019}, pages = {100--108}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DAPPCON.2019.00021}, doi = {10.1109/DAPPCON.2019.00021}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/dappcon/SelviPRDB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/marble/SelviPDBR19, author = {S. Sharmila Deva Selvi and Arinjita Paul and Siva Dirisala and Saswata Basu and C. Pandu Rangan}, editor = {Panos M. Pardalos and Ilias S. Kotsireas and Yike Guo and William J. Knottenbelt}, title = {Sharing of Encrypted Files in Blockchain Made Simpler}, booktitle = {1st International Conference on Mathematical Research for Blockchain Economy, {MARBLE} 2019, Santorini, Greece, May 6-9, 2019}, series = {Springer Proceedings in Business and Economics}, pages = {45--60}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37110-4\_4}, doi = {10.1007/978-3-030-37110-4\_4}, timestamp = {Tue, 11 Jul 2023 15:51:52 +0200}, biburl = {https://dblp.org/rec/conf/marble/SelviPDBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/marble/PaulSR19, author = {Arinjita Paul and Vorapong Suppakitpaisarn and C. Pandu Rangan}, editor = {Panos M. Pardalos and Ilias S. Kotsireas and Yike Guo and William J. Knottenbelt}, title = {Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks}, booktitle = {1st International Conference on Mathematical Research for Blockchain Economy, {MARBLE} 2019, Santorini, Greece, May 6-9, 2019}, series = {Springer Proceedings in Business and Economics}, pages = {201--216}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37110-4\_14}, doi = {10.1007/978-3-030-37110-4\_14}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/marble/PaulSR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/SelviHDR19, author = {S. Sharmila Deva Selvi and S. Harish and Swethashree Dhanabal and C. Pandu Rangan}, editor = {Guojun Wang and Jun Feng and Md. Zakirul Alam Bhuiyan and Rongxing Lu}, title = {A Closer Look at Anonymous Proxy Re-Encryption Schemes}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11611}, pages = {475--489}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24907-6\_36}, doi = {10.1007/978-3-030-24907-6\_36}, timestamp = {Thu, 05 Sep 2019 15:33:31 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/SelviHDR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-10719, author = {Mehul Kumar and Amit Kumar and C. Pandu Rangan}, title = {Reoptimization of Path Vertex Cover Problem}, journal = {CoRR}, volume = {abs/1904.10719}, year = {2019}, url = {http://arxiv.org/abs/1904.10719}, eprinttype = {arXiv}, eprint = {1904.10719}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-10719.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviPDBR19, author = {S. Sharmila Deva Selvi and Arinjita Paul and Siva Dirisala and Saswata Basu and C. Pandu Rangan}, title = {Sharing of Encrypted files in Blockchain Made Simpler}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2019}, url = {https://eprint.iacr.org/2019/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviPDBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulSR19, author = {Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1135}, year = {2019}, url = {https://eprint.iacr.org/2019/1135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulSR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulSR19a, author = {Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1325}, year = {2019}, url = {https://eprint.iacr.org/2019/1325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulSR19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviIR19, author = {S. Sharmila Deva Selvi and Irene Miriam Isaac and C. Pandu Rangan}, title = {Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1439}, year = {2019}, url = {https://eprint.iacr.org/2019/1439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviIR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/PaulSSR18, author = {Arinjita Paul and Varshika Srinivasavaradhan and S. Sharmila Deva Selvi and C. Pandu Rangan}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {111--128}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_7}, doi = {10.1007/978-3-030-01446-9\_7}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/PaulSSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyR18, author = {Suvradip Chakraborty and C. Pandu Rangan}, title = {Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {883}, year = {2018}, url = {https://eprint.iacr.org/2018/883}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulSSR18, author = {Arinjita Paul and Varshika Srinivasavaradhan and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1131}, year = {2018}, url = {https://eprint.iacr.org/2018/1131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulSSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviPR18, author = {S. Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan}, title = {A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1136}, year = {2018}, url = {https://eprint.iacr.org/2018/1136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChakrabortyPR17, author = {Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Efficient Compilers for After-the-Fact Leakage: From {CPA} to {CCA-2} Secure {PKE} to {AKE}}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {343--362}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_18}, doi = {10.1007/978-3-319-60055-0\_18}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChakrabortyPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SrinivasanR17, author = {Akshayaram Srinivasan and Chandrasekaran Pandu Rangan}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Efficiently Obfuscating Re-Encryption Program Under {DDH} Assumption}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {273--292}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_14}, doi = {10.1007/978-3-319-61204-1\_14}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/SrinivasanR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atis/SelviPR17, author = {S. Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan}, editor = {Lynn Batten and Dong Seong Kim and Xuyun Zhang and Gang Li}, title = {An Efficient Non-transferable Proxy Re-encryption Scheme}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {35--47}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_4}, doi = {10.1007/978-981-10-5421-1\_4}, timestamp = {Mon, 26 Jun 2023 20:45:03 +0200}, biburl = {https://dblp.org/rec/conf/atis/SelviPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SelviPR17, author = {S. Sharmila Deva Selvi and Arinjita Paul and Chandrasekaran Pandu Rangan}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without Pairing in the Random Oracle Model}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {459--469}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_21}, doi = {10.1007/978-3-030-02641-7\_21}, timestamp = {Wed, 25 Sep 2019 18:04:17 +0200}, biburl = {https://dblp.org/rec/conf/cans/SelviPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ChakrabortyRR17, author = {Suvradip Chakraborty and Y. Sreenivasa Rao and Chandrasekaran Pandu Rangan}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {An Efficient Attribute-Based Authenticated Key Exchange Protocol}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {493--503}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_24}, doi = {10.1007/978-3-030-02641-7\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ChakrabortyRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GuptaSRD17, author = {Kanika Gupta and S. Sharmila Deva Selvi and C. Pandu Rangan and Shubham Sopan Dighe}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Identity-Based Group Encryption Revisited}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {205--209}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_18}, doi = {10.1007/978-3-319-89500-0\_18}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/GuptaSRD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChakrabortyAR17, author = {Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan}, editor = {Tatsuaki Okamoto and Yong Yu and Man Ho Au and Yannan Li}, title = {Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting}, booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10592}, pages = {167--187}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68637-0\_10}, doi = {10.1007/978-3-319-68637-0\_10}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/ChakrabortyAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/SelviPR17, author = {S. Sharmila Deva Selvi and Arinjita Paul and Chandrasekaran Pandu Rangan}, editor = {Tatsuaki Okamoto and Yong Yu and Man Ho Au and Yannan Li}, title = {An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing}, booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10592}, pages = {413--433}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68637-0\_25}, doi = {10.1007/978-3-319-68637-0\_25}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/SelviPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyAR17, author = {Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan}, title = {New Approach to Practical Leakage-Resilient Public-Key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2017}, url = {http://eprint.iacr.org/2017/441}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyPR17, author = {Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan}, title = {Efficient Compilers for After-the-Fact Leakage: from {CPA} to {CCA-2} secure {PKE} to {AKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2017}, url = {http://eprint.iacr.org/2017/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyRMR17, author = {Suvradip Chakraborty and Chester Rebeiro and Debdeep Mukhopadhyay and C. Pandu Rangan}, title = {Leakage-Resilient Tweakable Encryption from One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2017}, url = {http://eprint.iacr.org/2017/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyRMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviPR17, author = {S. Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan}, title = {An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {768}, year = {2017}, url = {http://eprint.iacr.org/2017/768}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviPR17a, author = {S. Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan}, title = {On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2017}, url = {http://eprint.iacr.org/2017/867}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviPR17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/SinghRB16, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, title = {Lattice-based identity-based resplittable threshold public key encryption scheme}, journal = {Int. J. Comput. Math.}, volume = {93}, number = {2}, pages = {289--307}, year = {2016}, url = {https://doi.org/10.1080/00207160.2014.928286}, doi = {10.1080/00207160.2014.928286}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/SinghRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/VivekSCR16, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Pallavi Chandrasekar and C. Pandu Rangan}, title = {Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives}, journal = {J. Internet Serv. Inf. Secur.}, volume = {6}, number = {4}, pages = {35--53}, year = {2016}, url = {https://doi.org/10.22667/JISIS.2016.11.31.035}, doi = {10.22667/JISIS.2016.11.31.035}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/VivekSCR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChakrabortyRR16, author = {Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan}, title = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {1--22}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.001}, doi = {10.22667/JOWUA.2016.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChakrabortyRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SivanandamSSR16, author = {Sree Vivek Sivanandam and S. Sharmila Deva Selvi and Akshayaram Srinivasan and Chandrasekaran Pandu Rangan}, title = {Stronger public key encryption system withstanding {RAM} scraper like attacks}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1650--1662}, year = {2016}, url = {https://doi.org/10.1002/sec.1454}, doi = {10.1002/SEC.1454}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SivanandamSSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyRR16, author = {Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan}, title = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2016}, url = {http://eprint.iacr.org/2016/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PatraCR15, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan}, title = {Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation}, journal = {J. Cryptol.}, volume = {28}, number = {1}, pages = {49--109}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9172-7}, doi = {10.1007/S00145-013-9172-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PatraCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/SinghRB15, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, title = {Lattice Based Mix Network for Location Privacy in Mobile System}, journal = {Mob. Inf. Syst.}, volume = {2015}, pages = {963628:1--963628:9}, year = {2015}, url = {https://doi.org/10.1155/2015/963628}, doi = {10.1155/2015/963628}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/SinghRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Bose0R15, author = {Priyanka Bose and Dipanjan Das and Chandrasekaran Pandu Rangan}, editor = {Ernest Foo and Douglas Stebila}, title = {Constant Size Ring Signature Without Random Oracle}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {230--247}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_14}, doi = {10.1007/978-3-319-19962-7\_14}, timestamp = {Tue, 07 May 2024 20:09:57 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Bose0R15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SrinivasanR15, author = {Akshayaram Srinivasan and C. Pandu Rangan}, editor = {Feng Bao and Steven Miller and Sherman S. M. Chow and Danfeng Yao}, title = {Certificateless Proxy Re-Encryption Without Pairing: Revisited}, booktitle = {Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015}, pages = {41--52}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732516.2732519}, doi = {10.1145/2732516.2732519}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SrinivasanR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChakrabortyPR15, author = {Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {149--166}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_8}, doi = {10.1007/978-3-319-26059-4\_8}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ChakrabortyPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VivekSMR15, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Aanchal Malhotra and C. Pandu Rangan}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Practical {IBE} Secure under {CBDH} - Encrypting Without Pairing}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {251--258}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005541802510258}, doi = {10.5220/0005541802510258}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VivekSMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoseDR15, author = {Priyanka Bose and Dipanjan Das and C. Pandu Rangan}, title = {Constant Size Ring Signature Without Random Oracle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2015}, url = {http://eprint.iacr.org/2015/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoseDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyRR15a, author = {Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan}, title = {Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2015}, url = {http://eprint.iacr.org/2015/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyRR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SrinivasanR15, author = {Akshayaram Srinivasan and C. Pandu Rangan}, title = {Efficiently Obfuscating Re-Encryption Program under {DDH} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {822}, year = {2015}, url = {http://eprint.iacr.org/2015/822}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SrinivasanR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarthikeyanCSR15, author = {Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan}, title = {An Efficient Multiple {PKG} Compatible Identity Based Key Agreement for Vehicular Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2015}, url = {http://eprint.iacr.org/2015/1012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarthikeyanCSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/PatraCR14, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan}, title = {Asynchronous Byzantine Agreement with optimal resilience}, journal = {Distributed Comput.}, volume = {27}, number = {2}, pages = {111--146}, year = {2014}, url = {https://doi.org/10.1007/s00446-013-0200-5}, doi = {10.1007/S00446-013-0200-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dc/PatraCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SinghRB14, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, title = {Lattice Based Universal Re-encryption for Mixnet}, journal = {J. Internet Serv. Inf. Secur.}, volume = {4}, number = {1}, pages = {1--11}, year = {2014}, url = {https://doi.org/10.22667/JISIS.2014.02.31.001}, doi = {10.22667/JISIS.2014.02.31.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SinghRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SinghRB14a, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, title = {Guest Editorial: Special Issue on Cyber Security Protections and Applications}, journal = {J. Internet Serv. Inf. Secur.}, volume = {4}, number = {2}, pages = {1--3}, year = {2014}, url = {https://doi.org/10.22667/JISIS.2014.05.31.001}, doi = {10.22667/JISIS.2014.05.31.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SinghRB14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/JoseGP14, author = {Sangeetha Jose and Akash Gautam and Chandrasekaran Pandu Rangan}, title = {A New Certificateless Blind Signature Scheme}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {1}, pages = {122--141}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.03.31.122}, doi = {10.22667/JOWUA.2014.03.31.122}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/JoseGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/BadrinarayananR14, author = {Saikrishna Badrinarayanan and C. Pandu Rangan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Joaquim Filipe}, title = {Certificateless and Identity based Authenticated Key Exchange Protocols}, booktitle = {E-Business and Telecommunications - 11th International Joint Conference, {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {554}, pages = {255--277}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-25915-4\_14}, doi = {10.1007/978-3-319-25915-4\_14}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/BadrinarayananR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/SinghRB14, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, editor = {Linawati and Made Sudiana Mahendra and Erich J. Neuhold and A Min Tjoa and Ilsun You}, title = {Efficient Lattice {HIBE} in the Standard Model with Shorter Public Parameters}, booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8407}, pages = {542--553}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55032-4\_56}, doi = {10.1007/978-3-642-55032-4\_56}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/SinghRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/SinghRB14a, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, editor = {Linawati and Made Sudiana Mahendra and Erich J. Neuhold and A Min Tjoa and Ilsun You}, title = {Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme}, booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8407}, pages = {564--575}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55032-4\_58}, doi = {10.1007/978-3-642-55032-4\_58}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/SinghRB14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BadrinarayananR14, author = {Saikrishna Badrinarayanan and C. Pandu Rangan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {67--78}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005043400670078}, doi = {10.5220/0005043400670078}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BadrinarayananR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/SinghRB14, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, editor = {Rajat Subhra Chakraborty and Vashek Matyas and Patrick Schaumont}, title = {Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, pages = {76--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_6}, doi = {10.1007/978-3-319-12060-7\_6}, timestamp = {Mon, 15 Jun 2020 17:10:47 +0200}, biburl = {https://dblp.org/rec/conf/space/SinghRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SrinivasanR14, author = {Akshayaram Srinivasan and C. Pandu Rangan}, title = {Certificateless Proxy Re-Encryption Without Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {933}, year = {2014}, url = {http://eprint.iacr.org/2014/933}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SrinivasanR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SinghPB13, author = {Kunwar Singh and C. Pandurangan and A. K. Banerjee}, title = {Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {5--19}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.005}, doi = {10.22667/JISIS.2013.02.31.005}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SinghPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SelviVPR13, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Vivek Krishna Pradhan and C. Pandu Rangan}, title = {Efficient Certificateless Online/Offline Signature with tight security}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {115--137}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.115}, doi = {10.22667/JISIS.2013.02.31.115}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SelviVPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SinghRB13, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, title = {Lattice Based Identity Based Proxy Re-Encryption Scheme}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {38--51}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.038}, doi = {10.22667/JISIS.2013.11.31.038}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SinghRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SinghRB13, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, title = {Lattice Based Efficient Threshold Public Key Encryption Scheme}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {93--107}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.093}, doi = {10.22667/JOWUA.2013.12.31.093}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SinghRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MathewVR13, author = {K. Preetha Mathew and Sachin Vasant and C. Pandu Rangan}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {342--362}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_21}, doi = {10.1007/978-3-319-12160-4\_21}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MathewVR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MathewVR13a, author = {K. Preetha Mathew and Sachin Vasant and C. Pandu Rangan}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {517--535}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_31}, doi = {10.1007/978-3-319-12160-4\_31}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MathewVR13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/VivekSVR13, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Layamrudhaa Renganathan Venkatesan and C. Pandu Rangan}, editor = {Willy Susilo and Reza Reyhanitabar}, title = {Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round}, booktitle = {Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8209}, pages = {38--58}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41227-1\_3}, doi = {10.1007/978-3-642-41227-1\_3}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/VivekSVR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/BarapatreR13, author = {Prateek Barapatre and Chandrasekaran Pandu Rangan}, editor = {Benedikt Gierlichs and Sylvain Guilley and Debdeep Mukhopadhyay}, title = {Identity-Based Identification Schemes from ID-KEMs}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - Third International Conference, {SPACE} 2013, Kharagpur, India, October 19-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8204}, pages = {111--129}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41224-0\_9}, doi = {10.1007/978-3-642-41224-0\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/BarapatreR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/BarapatreR13a, author = {Prateek Barapatre and Chandrasekaran Pandu Rangan}, editor = {Benedikt Gierlichs and Sylvain Guilley and Debdeep Mukhopadhyay}, title = {Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - Third International Conference, {SPACE} 2013, Kharagpur, India, October 19-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8204}, pages = {130--146}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41224-0\_10}, doi = {10.1007/978-3-642-41224-0\_10}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/BarapatreR13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbinavBRSVP13, author = {Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek Krishna Pradhan}, title = {A Revocable Online-Offline Certificateless Signature Scheme without Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {758}, year = {2013}, url = {http://eprint.iacr.org/2013/758}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbinavBRSVP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/BadanidiyuruPCSR12, author = {Ashwinkumar Badanidiyuru and Arpita Patra and Ashish Choudhury and Kannan Srinathan and C. Pandu Rangan}, title = {On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission}, journal = {J. {ACM}}, volume = {59}, number = {5}, pages = {22:1--22:35}, year = {2012}, url = {https://doi.org/10.1145/2371656.2371657}, doi = {10.1145/2371656.2371657}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/BadanidiyuruPCSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SelviVPR12, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Vivek Krishna Pradhan and C. Pandu Rangan}, title = {Efficient Certificateless Online/Offline Signature}, journal = {J. Internet Serv. Inf. Secur.}, volume = {2}, number = {3/4}, pages = {77--92}, year = {2012}, url = {https://doi.org/10.22667/JISIS.2012.11.31.077}, doi = {10.22667/JISIS.2012.11.31.077}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SelviVPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SinghPB12, author = {Kunwar Singh and C. Pandurangan and A. K. Banerjee}, title = {Lattice Forward-Secure Identity Based Encryption Scheme}, journal = {J. Internet Serv. Inf. Secur.}, volume = {2}, number = {3/4}, pages = {118--128}, year = {2012}, url = {https://doi.org/10.22667/JISIS.2012.11.31.118}, doi = {10.22667/JISIS.2012.11.31.118}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SinghPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VivekSVR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Ramarathnam Venkatesan and C. Pandu Rangan}, title = {A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {46--60}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.046}, doi = {10.22667/JOWUA.2012.12.31.046}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VivekSVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VivekSKR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Salini Selvaraj Kowsalya and C. Pandu Rangan}, title = {{PKI} Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {72--84}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.072}, doi = {10.22667/JOWUA.2012.12.31.072}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VivekSKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/VivekSSR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Deepanshu Shukla and C. Pandu Rangan}, title = {Group key establishment {(GKE):} Two/three party key exchange to {GKE}}, booktitle = {{IEEE} International Conference on Advanced Networks and Telecommuncations Systems, {ANTS} 2012, Bangalore, India, 16-19 December, 2012}, pages = {61--66}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ANTS.2012.6524229}, doi = {10.1109/ANTS.2012.6524229}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/IEEEants/VivekSSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MathewVVR12, author = {K. Preetha Mathew and Sachin Vasant and Sridhar Venkatesan and C. Pandu Rangan}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {An Efficient {IND-CCA2} Secure Variant of the Niederreiter Encryption Scheme in the Standard Model}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {166--179}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_13}, doi = {10.1007/978-3-642-31448-3\_13}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MathewVVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SelviVR12, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {280--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_21}, doi = {10.1007/978-3-642-31448-3\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SelviVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/RameshRISR12, author = {Amitash Ramesh and Soumya Ramesh and Sudarshan Iyengar and Vinod Sekhar and C. Pandu Rangan}, title = {Obstacles Incentivize Human Learning: {A} Network Theoretic Study}, booktitle = {International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012}, pages = {1295--1300}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ASONAM.2012.223}, doi = {10.1109/ASONAM.2012.223}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/RameshRISR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/MIMRPM12, author = {M. Vijesh and Sudarshan Iyengar and S. M. Vijay Mahantesh and Amitash Ramesh and C. Pandu Rangan and Veni Madhavan}, title = {A Navigation Algorithm Inspired by Human Navigation}, booktitle = {International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012}, pages = {1309--1314}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ASONAM.2012.225}, doi = {10.1109/ASONAM.2012.225}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/MIMRPM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KVVR12, author = {K. Preetha Mathew and Sachin Vasant and Sridhar Venkatesan and C. Pandu Rangan}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {144--157}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_10}, doi = {10.1007/978-3-642-29101-2\_10}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/KVVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/VivekSR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Compact Stateful Encryption Schemes with Ciphertext Verifiability}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {87--104}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_6}, doi = {10.1007/978-3-642-34117-5\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/VivekSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latin/GopalakrishnanKKRRS12, author = {Ragavendran Gopalakrishnan and Dimitrios Kanoulas and Naga Naresh Karuturi and C. Pandu Rangan and Rajmohan Rajaraman and Ravi Sundaram}, editor = {David Fern{\'{a}}ndez{-}Baca}, title = {Cache Me If You Can: Capacitated Selfish Replication Games}, booktitle = {{LATIN} 2012: Theoretical Informatics - 10th Latin American Symposium, Arequipa, Peru, April 16-20, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7256}, pages = {420--432}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29344-3\_36}, doi = {10.1007/978-3-642-29344-3\_36}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/latin/GopalakrishnanKKRRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/SelviVVR12, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan}, editor = {Tsuyoshi Takagi and Guilin Wang and Zhiguang Qin and Shaoquan Jiang and Yong Yu}, title = {{ID} Based Signcryption Scheme in Standard Model}, booktitle = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7496}, pages = {35--52}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33272-2\_4}, doi = {10.1007/978-3-642-33272-2\_4}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/SelviVVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sarnoff/SelviVSR12, author = {S. Sharmila Deva Selvi and S. Sree Vivek and J. Shriram and C. Pandu Rangan}, title = {Identity based partial aggregate signature scheme without pairing}, booktitle = {35th {IEEE} Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SARNOF.2012.6222731}, doi = {10.1109/SARNOF.2012.6222731}, timestamp = {Mon, 10 Feb 2020 16:25:22 +0100}, biburl = {https://dblp.org/rec/conf/sarnoff/SelviVSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/SinghPB12, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, editor = {Andrey Bogdanov and Somitra Kumar Sanadhya}, title = {Adaptively Secure Efficient Lattice {(H)IBE} in Standard Model with Short Public Parameters}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - Second International Conference, {SPACE} 2012, Chennai, India, November 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7644}, pages = {153--172}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34416-9\_11}, doi = {10.1007/978-3-642-34416-9\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/SinghPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GaneshR12, author = {Chaya Ganesh and C. Pandu Rangan}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Optimal Parameters for Efficient Two-Party Computation Protocols}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {128--143}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_12}, doi = {10.1007/978-3-642-30955-7\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GaneshR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VivekSBR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Guhan Balasubramanian and C. Pandu Rangan}, title = {Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2012}, url = {http://eprint.iacr.org/2012/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VivekSBR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VivekSR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {Stronger Public Key Encryption Schemes Withstanding {RAM} Scraper Like Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2012}, url = {http://eprint.iacr.org/2012/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VivekSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVVR12, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan}, title = {{ID} Based Signcryption Scheme in Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2012}, url = {http://eprint.iacr.org/2012/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KVR12, author = {K. Preetha Mathew and Sachin Vasant and C. Pandu Rangan}, title = {On Provably Secure Code-Based Signature and Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2012}, url = {http://eprint.iacr.org/2012/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgaa/ReddyR11, author = {T. V. Thirumala Reddy and C. Pandu Rangan}, title = {Variants of Spreading Messages}, journal = {J. Graph Algorithms Appl.}, volume = {15}, number = {5}, pages = {683--699}, year = {2011}, url = {https://doi.org/10.7155/jgaa.00244}, doi = {10.7155/JGAA.00244}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jgaa/ReddyR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/ChoudhuryPASR11, author = {Ashish Choudhury and Arpita Patra and B. V. Ashwinkumar and Kannan Srinathan and C. Pandu Rangan}, title = {Secure message transmission in asynchronous networks}, journal = {J. Parallel Distributed Comput.}, volume = {71}, number = {8}, pages = {1067--1074}, year = {2011}, url = {https://doi.org/10.1016/j.jpdc.2011.03.004}, doi = {10.1016/J.JPDC.2011.03.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/ChoudhuryPASR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/PatraR11, author = {Arpita Patra and C. Pandu Rangan}, editor = {Serge Fehr}, title = {Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {206--226}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_19}, doi = {10.1007/978-3-642-20728-0\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/PatraR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosechicomnet/SelviVR11, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Marc Joye and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Identity Based Online/Offline Encryption and Signcryption Schemes Revisited}, booktitle = {Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7011}, pages = {111--127}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24586-2\_11}, doi = {10.1007/978-3-642-24586-2\_11}, timestamp = {Fri, 27 Mar 2020 08:56:51 +0100}, biburl = {https://dblp.org/rec/conf/infosechicomnet/SelviVR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SelviVR11, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Identity-Based Deterministic Signature Scheme without Forking-Lemma}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {79--95}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_6}, doi = {10.1007/978-3-642-25141-2\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SelviVR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VivekSR11, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {{CCA} Secure Certificateless Encryption Schemes based on {RSA}}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {208--217}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VivekSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vcip/SundarR11, author = {R. Shyam Sundar and C. Pandu Rangan}, editor = {Jar{-}Ferr Yang and Hsueh{-}Ming Hang and Masayuki Tanimoto and Tsuhan Chen}, title = {Bit-depth scalable video coding using error residual correction}, booktitle = {2011 {IEEE} Visual Communications and Image Processing, {VCIP} 2011, Tainan, Taiwan, November 6-9, 2011}, pages = {1--4}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/VCIP.2011.6116060}, doi = {10.1109/VCIP.2011.6116060}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/vcip/SundarR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/walcom/GhoshNR11, author = {Esha Ghosh and N. S. Narayanaswamy and C. Pandu Rangan}, editor = {Naoki Katoh and Amit Kumar}, title = {A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs}, booktitle = {{WALCOM:} Algorithms and Computation - 5th International Workshop, {WALCOM} 2011, New Delhi, India, February 18-20, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6552}, pages = {191--201}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19094-0\_20}, doi = {10.1007/978-3-642-19094-0\_20}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/walcom/GhoshNR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1109-1706, author = {Esha Ghosh and Subhas Kumar Ghosh and C. Pandu Rangan}, title = {On the Fault Tolerance and Hamiltonicity of the Optical Transpose Interconnection System of Non-Hamiltonian Base Graphs}, journal = {CoRR}, volume = {abs/1109.1706}, year = {2011}, url = {http://arxiv.org/abs/1109.1706}, eprinttype = {arXiv}, eprint = {1109.1706}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1109-1706.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1112-4033, author = {William K. Moses Jr. and C. Pandu Rangan}, title = {Rational Secret Sharing over an Asynchronous Broadcast Channel with Information Theoretic Security}, journal = {CoRR}, volume = {abs/1112.4033}, year = {2011}, url = {http://arxiv.org/abs/1112.4033}, eprinttype = {arXiv}, eprint = {1112.4033}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1112-4033.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MosesR11, author = {William K. Moses Jr. and C. Pandu Rangan}, title = {Rational Secret Sharing with Honest Players over an Asynchronous Channel}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2011}, url = {http://eprint.iacr.org/2011/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MosesR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR11, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Deterministic Signature Scheme Without Forking-Lemma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2011}, url = {http://eprint.iacr.org/2011/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VivekSR11, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {Compact CCA-Secure Encryption with Ciphertext Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2011}, url = {http://eprint.iacr.org/2011/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VivekSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVVR11, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan}, title = {On the Security of {ID} Based Signcryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {664}, year = {2011}, url = {http://eprint.iacr.org/2011/664}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVVR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR11a, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2011}, url = {http://eprint.iacr.org/2011/695}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/PatraCRS10, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan and Kannan Srinathan}, title = {Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {2}, pages = {159--197}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.038309}, doi = {10.1504/IJACT.2010.038309}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/PatraCRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mics/SivanHR10, author = {Balasubramanian Sivan and S. Harini and C. Pandu Rangan}, title = {On Conditional Covering Problem}, journal = {Math. Comput. Sci.}, volume = {3}, number = {1}, pages = {97--107}, year = {2010}, url = {https://doi.org/10.1007/s11786-009-0001-1}, doi = {10.1007/S11786-009-0001-1}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mics/SivanHR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/PatraCR10, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Communication Efficient Perfectly Secure {VSS} and {MPC} in Asynchronous Networks with Optimal Resilience}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {184--202}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_12}, doi = {10.1007/978-3-642-12678-9\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/PatraCR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KumaresanPR10, author = {Ranjit Kumaresan and Arpita Patra and C. Pandu Rangan}, editor = {Masayuki Abe}, title = {The Round Complexity of Verifiable Secret Sharing: The Statistical Case}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {431--447}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_25}, doi = {10.1007/978-3-642-17373-8\_25}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KumaresanPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KumarABR10, author = {Swarun Kumar and Shivank Agrawal and Subha Balaraman and C. Pandu Rangan}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {Attribute Based Signatures for Bounded Multi-level Threshold Circuits}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {141--154}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_10}, doi = {10.1007/978-3-642-22633-5\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/KumarABR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/PatraCR10, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Krishna Kant and Sriram V. Pemmaraju and Krishna M. Sivalingam and Jie Wu}, title = {On Communication Complexity of Secure Message Transmission in Directed Networks}, booktitle = {Distributed Computing and Networking, 11th International Conference, {ICDCN} 2010, Kolkata, India, January 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5935}, pages = {42--53}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11322-2\_9}, doi = {10.1007/978-3-642-11322-2\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/PatraCR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/GuptaHSR10, author = {Anuj Gupta and Sandeep Hans and Kannan Srinathan and C. Pandu Rangan}, editor = {Krishna Kant and Sriram V. Pemmaraju and Krishna M. Sivalingam and Jie Wu}, title = {On Composability of Reliable Unicast and Broadcast}, booktitle = {Distributed Computing and Networking, 11th International Conference, {ICDCN} 2010, Kolkata, India, January 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5935}, pages = {54--66}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11322-2\_10}, doi = {10.1007/978-3-642-11322-2\_10}, timestamp = {Fri, 02 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/GuptaHSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KumarAVLR10, author = {Swarun Kumar and Shivank Agrawal and Ramarathnam Venkatesan and Satyanarayana V. Lokam and C. Pandu Rangan}, editor = {Mohammad S. Obaidat and George A. Tsihrintzis and Joaquim Filipe}, title = {Threshold Discernible Ring Signatures}, booktitle = {e-Business and Telecommunications - 7th International Joint Conference, {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {222}, pages = {259--273}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25206-8\_17}, doi = {10.1007/978-3-642-25206-8\_17}, timestamp = {Sat, 19 Oct 2019 20:35:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/KumarAVLR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SelviVR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Certificateless {KEM} and Hybrid Signcryption Schemes Revisited}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {294--307}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_22}, doi = {10.1007/978-3-642-12827-1\_22}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SelviVR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/NarasimhanVR10, author = {Harikrishna Narasimhan and Venkatanathan Varadarajan and C. Pandu Rangan}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {359--376}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_26}, doi = {10.1007/978-3-642-12827-1\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/NarasimhanVR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/PatraR10, author = {Arpita Patra and C. Pandu Rangan}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {Communication Optimal Multi-valued Asynchronous Broadcast Protocol}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, pages = {162--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8\_10}, doi = {10.1007/978-3-642-14712-8\_10}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/PatraR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SelviVRP10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Chandrasekaran Pandu Rangan and S. Priti}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {On the Security of Identity Based Threshold Unsigncryption Schemes}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {554--559}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.99}, doi = {10.1109/NSS.2010.99}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/SelviVRP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SelviVNR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and S. Gopi Nath and C. Pandu Rangan}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Identity Based Self Delegated Signature - Self Proxy Signatures}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {568--573}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.98}, doi = {10.1109/NSS.2010.98}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/SelviVNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/SundarR10, author = {R. Shyam Sundar and C. Pandu Rangan}, editor = {Guoping Qiu and Kin{-}Man Lam and Hitoshi Kiya and Xiangyang Xue and C.{-}C. Jay Kuo and Michael S. Lew}, title = {Spatiogram Based Fast Mode Decision in Spatial Scalable Video Coding}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2010 - 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6298}, pages = {121--135}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15696-0\_12}, doi = {10.1007/978-3-642-15696-0\_12}, timestamp = {Mon, 26 Jun 2023 20:47:39 +0200}, biburl = {https://dblp.org/rec/conf/pcm/SundarR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/PatraR10, author = {Arpita Patra and C. Pandu Rangan}, editor = {Andr{\'{e}}a W. Richa and Rachid Guerraoui}, title = {Brief announcement: communication efficient asynchronous byzantine agreement}, booktitle = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010}, pages = {243--244}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1835698.1835756}, doi = {10.1145/1835698.1835756}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/PatraR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/PatraCR10, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan}, editor = {Andr{\'{e}}a W. Richa and Rachid Guerraoui}, title = {Brief announcement: perfectly secure message transmissiontolerating mobile mixed adversary with reduced phase complexity}, booktitle = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010}, pages = {245--246}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1835698.1835757}, doi = {10.1145/1835698.1835757}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/PatraCR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/SelviVR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Identity Based Public Verifiable Signcryption Scheme}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {244--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_17}, doi = {10.1007/978-3-642-16280-0\_17}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/SelviVR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SelviVAR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Sakhi S. Anand and C. Pandu Rangan}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {An Identity based Ring Signcryption Scheme with Public Verifiability}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {362--371}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SelviVAR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KumarAVLR10, author = {Swarun Kumar and Shivank Agrawal and Ramarathnam Venkatesan and Satyanarayana V. Lokam and C. Pandu Rangan}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Forcing Out a Confession - Threshold Discernible Ring Signatures}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {379--388}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KumarAVLR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/walcom/ReddyKR10, author = {T. V. Thirumala Reddy and D. Sai Krishna and C. Pandu Rangan}, editor = {Md. Saidur Rahman and Satoshi Fujita}, title = {Variants of Spreading Messages}, booktitle = {{WALCOM:} Algorithms and Computation, 4th International Workshop, {WALCOM} 2010, Dhaka, Bangladesh, February 10-12, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5942}, pages = {240--251}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11440-3\_22}, doi = {10.1007/978-3-642-11440-3\_22}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/walcom/ReddyKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/walcom/KrishnaRSR10, author = {D. Sai Krishna and T. V. Thirumala Reddy and B. Sai Shashank and C. Pandu Rangan}, editor = {Md. Saidur Rahman and Satoshi Fujita}, title = {Pathwidth and Searching in Parameterized Threshold Graphs}, booktitle = {{WALCOM:} Algorithms and Computation, 4th International Workshop, {WALCOM} 2010, Dhaka, Bangladesh, February 10-12, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5942}, pages = {293--304}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11440-3\_27}, doi = {10.1007/978-3-642-11440-3\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/walcom/KrishnaRSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/NarasimhanVC10, author = {Harikrishna Narasimhan and Venkatanathan Varadarajan and C. Pandu Rangan}, title = {Towards a Cooperative Defense Model Against Network Security Attacks}, booktitle = {9th Annual Workshop on the Economics of Information Security, {WEIS} 2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010}, year = {2010}, url = {http://weis2010.econinfosec.org/papers/session4/weis2010\_narasimhan.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:46 +0200}, biburl = {https://dblp.org/rec/conf/weis/NarasimhanVC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-3504, author = {Arpita Patra and C. Pandu Rangan}, title = {Communication and Round Efficient Information Checking Protocol}, journal = {CoRR}, volume = {abs/1004.3504}, year = {2010}, url = {http://arxiv.org/abs/1004.3504}, eprinttype = {arXiv}, eprint = {1004.3504}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-3504.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1007-2694, author = {Ragavendran Gopalakrishnan and Dimitrios Kanoulas and Naga Naresh Karuturi and C. Pandu Rangan and Rajmohan Rajaraman and Ravi Sundaram}, title = {Capacitated Caching Games}, journal = {CoRR}, volume = {abs/1007.2694}, year = {2010}, url = {http://arxiv.org/abs/1007.2694}, eprinttype = {arXiv}, eprint = {1007.2694}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1007-2694.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR10, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Communication Efficient Perfectly Secure {VSS} and {MPC} in Asynchronous Networks with Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2010}, url = {http://eprint.iacr.org/2010/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Security Weaknesses in Two Certificateless Signcryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2010}, url = {http://eprint.iacr.org/2010/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKSR10, author = {Shivank Agrawal and Swarun Kumar and Amjed Shareef and C. Pandu Rangan}, title = {Sanitizable signatures with strong transparency in the standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2010}, url = {http://eprint.iacr.org/2010/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10a, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Online/Offline Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2010}, url = {http://eprint.iacr.org/2010/178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShareefAR10, author = {Amjed Shareef and Akshay Agrawal and C. Pandu Rangan}, title = {Collusion Free Protocol for Correlated Element Selection Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2010}, url = {http://eprint.iacr.org/2010/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShareefAR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10b, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Public Verifiable Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2010}, url = {http://eprint.iacr.org/2010/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVNR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and S. Gopi Nath and C. Pandu Rangan}, title = {Identity Based Self Delegated Signature - Self Proxy Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2010}, url = {http://eprint.iacr.org/2010/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVPR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and S. Priti and C. Pandu Rangan}, title = {On the Security of Identity Based Threshold Unsigncryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2010}, url = {http://eprint.iacr.org/2010/360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10c, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Online/Offline Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2010}, url = {http://eprint.iacr.org/2010/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10d, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {{CCA2} Secure Certificateless Encryption Schemes Based on {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2010}, url = {http://eprint.iacr.org/2010/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVSR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and J. Shriram and C. Pandu Rangan}, title = {Identity Based Partial Aggregate Signature Scheme Without Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2010}, url = {http://eprint.iacr.org/2010/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/PatraCRSR09, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan and Kannan Srinathan and Prasad Raghavendra}, title = {Perfectly reliable and secure message transmission tolerating mobile adversary}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {200--224}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023467}, doi = {10.1504/IJACT.2009.023467}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/PatraCRSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/NarayananAAPCR09, author = {G. Sathya Narayanan and T. Aishwarya and Anugrah Agrawal and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {21--40}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_2}, doi = {10.1007/978-3-642-10433-6\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/NarayananAAPCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SrinathanPCR09, author = {Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {171--182}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533083}, doi = {10.1145/1533057.1533083}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SrinathanPCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/SelviVR09, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {75--92}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_6}, doi = {10.1007/978-3-642-16342-5\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/SelviVR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/AgrawalKSR09, author = {Shivank Agrawal and Swarun Kumar and Amjed Shareef and C. Pandu Rangan}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Sanitizable Signatures with Strong Transparency in the Standard Model}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {93--107}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_7}, doi = {10.1007/978-3-642-16342-5\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/AgrawalKSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/SelviVNR09, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Shilpi Nayak and C. Pandu Rangan}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Breaking and Building of Threshold Signcryption Schemes}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {108--123}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_8}, doi = {10.1007/978-3-642-16342-5\_8}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/SelviVNR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/PatraCR09, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {179--197}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_14}, doi = {10.1007/978-3-642-16342-5\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/PatraCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PatraCRR09, author = {Arpita Patra and Ashish Choudhary and Tal Rabin and C. Pandu Rangan}, editor = {Shai Halevi}, title = {The Round Complexity of Verifiable Secret Sharing Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {487--504}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_29}, doi = {10.1007/978-3-642-03356-8\_29}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PatraCRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/ChoudharyPASR09, author = {Ashish Choudhary and Arpita Patra and B. V. Ashwinkumar and Kannan Srinathan and C. Pandu Rangan}, editor = {Vijay K. Garg and Roger Wattenhofer and Kishore Kothapalli}, title = {On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks}, booktitle = {Distributed Computing and Networking, 10th International Conference, {ICDCN} 2009, Hyderabad, India, January 3-6, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5408}, pages = {148--162}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-540-92295-7\_19}, doi = {10.1007/978-3-540-92295-7\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/ChoudharyPASR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/PatraCR09, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Kaoru Kurosawa}, title = {Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {74--92}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_7}, doi = {10.1007/978-3-642-14496-7\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/PatraCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SelviVSKR09, author = {S. Sharmila Deva Selvi and S. Sree Vivek and J. Shriram and S. Kalaivani and C. Pandu Rangan}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Identity Based Aggregate Signcryption Schemes}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {378--397}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_25}, doi = {10.1007/978-3-642-10628-6\_25}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SelviVSKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PatraCR09, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Round Efficient Unconditionally Secure {MPC} and Multiparty Set Intersection with Optimal Resilience}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {398--417}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_26}, doi = {10.1007/978-3-642-10628-6\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PatraCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SelviVR09, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {On the Security of Identity Based Ring Signcryption Schemes}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {310--325}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_25}, doi = {10.1007/978-3-642-04474-8\_25}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/SelviVR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwoca/ReddyKR09, author = {T. V. Thirumala Reddy and D. Sai Krishna and C. Pandu Rangan}, editor = {Jir{\'{\i}} Fiala and Jan Kratochv{\'{\i}}l and Mirka Miller}, title = {The Guarding Problem - Complexity and Approximation}, booktitle = {Combinatorial Algorithms, 20th International Workshop, {IWOCA} 2009, Hradec nad Moravic{\'{\i}}, Czech Republic, June 28-July 2, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5874}, pages = {460--470}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10217-2\_45}, doi = {10.1007/978-3-642-10217-2\_45}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/iwoca/ReddyKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SelviVSR09, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and Chandrasekaran Pandu Rangan}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {An Efficient Identity-Based Signcryption Scheme for Multiple Receivers}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {71--88}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_6}, doi = {10.1007/978-3-642-04846-3\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SelviVSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/PatraCR09, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Srikanta Tirthapura and Lorenzo Alvisi}, title = {Simple and efficient asynchronous byzantine agreement with optimal resilience}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2009, Calgary, Alberta, Canada, August 10-12, 2009}, pages = {92--101}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1582716.1582736}, doi = {10.1145/1582716.1582736}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/PatraCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/PatraCR09a, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Srikanta Tirthapura and Lorenzo Alvisi}, title = {Brief announcement: perfectly secure message transmission in directed networks re-visited}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2009, Calgary, Alberta, Canada, August 10-12, 2009}, pages = {278--279}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1582716.1582763}, doi = {10.1145/1582716.1582763}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/PatraCR09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/SelviVR09, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Breaking and Fixing of an Identity Based Multi-Signcryption Scheme}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {61--75}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_7}, doi = {10.1007/978-3-642-04642-1\_7}, timestamp = {Sun, 02 Jun 2019 21:26:38 +0200}, biburl = {https://dblp.org/rec/conf/provsec/SelviVR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PatraCR09, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Information Theoretically Secure Multi Party Set Intersection Re-visited}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {71--91}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_5}, doi = {10.1007/978-3-642-05445-7\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PatraCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VivekSR09, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {On the Security of Two Ring Signcryption Schemes}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {219--224}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 21:15:22 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VivekSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/VivekSNR09, author = {S. Sree Vivek and S. Sharmila Deva Selvi and S. Gopi Nath and C. Pandu Rangan}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {Breaking and Building of Group Inside Signature}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {330--339}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_19}, doi = {10.1007/978-3-642-05284-2\_19}, timestamp = {Sun, 07 Jan 2018 16:56:18 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/VivekSNR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/walcom/BalasubramanianHR09, author = {Balasubramanian Sivan and S. Harini and C. Pandu Rangan}, editor = {Sandip Das and Ryuhei Uehara}, title = {Core and Conditional Core Path of Specified Length in Special Classes of Graphs}, booktitle = {{WALCOM:} Algorithms and Computation, Third International Workshop, {WALCOM} 2009, Kolkata, India, February 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5431}, pages = {262--273}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00202-1\_23}, doi = {10.1007/978-3-642-00202-1\_23}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/walcom/BalasubramanianHR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VivekSR09, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {{ON} {THE} {SECURITY} {OF} {TWO} {RING} {SIGNCRYPTION} {SCHEMES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2009}, url = {http://eprint.iacr.org/2009/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VivekSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VivekSSR09, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Deepanshu Shukla and C. Pandu Rangan}, title = {Scalable Compilers for Group Key Establishment : Two/Three Party to Group}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2009}, url = {http://eprint.iacr.org/2009/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VivekSSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR09a, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Information Theoretically Secure Multi Party Set Intersection Re-Visited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2009}, url = {http://eprint.iacr.org/2009/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR09, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {On the security of Identity Based Ring Signcryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2009}, url = {http://eprint.iacr.org/2009/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VivekSNR09, author = {S. Sree Vivek and S. Sharmila Deva Selvi and S. Gopi Nath and C. Pandu Rangan}, title = {Breaking and Building of Group Inside Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2009}, url = {http://eprint.iacr.org/2009/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VivekSNR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR09a, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Breaking and Fixing of an Identity Based Multi-Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2009}, url = {http://eprint.iacr.org/2009/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVSKR09, author = {S. Sharmila Deva Selvi and S. Sree Vivek and J. Shriram and S. Kalaivani and C. Pandu Rangan}, title = {Security Analysis of Aggregate signature and Batch verification signature schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2009}, url = {http://eprint.iacr.org/2009/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVSKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR09b, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2009}, url = {http://eprint.iacr.org/2009/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR09c, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {A note on the Certificateless Multi-receiver Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2009}, url = {http://eprint.iacr.org/2009/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR09c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NarayananAAPCR09, author = {G. Sathya Narayanan and T. Aishwarya and Anugrah Agrawal and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2009}, url = {http://eprint.iacr.org/2009/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NarayananAAPCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NarasimhanVR09, author = {Harikrishna Narasimhan and Venkatanathan Varadarajan and C. Pandu Rangan}, title = {Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2009}, url = {http://eprint.iacr.org/2009/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NarasimhanVR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraR09, author = {Arpita Patra and C. Pandu Rangan}, title = {Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2009}, url = {http://eprint.iacr.org/2009/433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR09d, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Certificateless {KEM} and Hybrid Signcryption Schemes Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2009}, url = {http://eprint.iacr.org/2009/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR09d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR09b, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2009}, url = {http://eprint.iacr.org/2009/470}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR09c, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2009}, url = {http://eprint.iacr.org/2009/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR09c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatraCVR08, author = {Arpita Patra and Ashish Choudhary and Madhu Vaidyanathan and C. Pandu Rangan}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {170--186}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_13}, doi = {10.1007/978-3-540-70500-0\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatraCVR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SrinathanPCR08, author = {Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Unconditionally Reliable Message Transmission in Directed Hypergraphs}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {285--303}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_21}, doi = {10.1007/978-3-540-89641-8\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/SrinathanPCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/KirtaneR08, author = {Varad Kirtane and C. Pandu Rangan}, editor = {Gregory L. Heileman and Marc Joye}, title = {{RSA-TBOS} signcryption with proxy re-encryption}, booktitle = {Proceedings of the 8th {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008}, pages = {59--66}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456520.1456531}, doi = {10.1145/1456520.1456531}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/KirtaneR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/SelviVRJ08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan and Neha Jain}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {II:} Workshops}, pages = {127--132}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.187}, doi = {10.1109/EUC.2008.187}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/SelviVRJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/ShareefR08, author = {Amjed Shareef and C. Pandu Rangan}, editor = {Shrisha Rao and Mainak Chatterjee and Prasad Jayanti and C. Siva Ram Murthy and Sanjoy Kumar Saha}, title = {On Optimal Probabilistic Asynchronous Byzantine Agreement}, booktitle = {Distributed Computing and Networking, 9th International Conference, {ICDCN} 2008, Kolkata, India, January 5-8, 2008}, series = {Lecture Notes in Computer Science}, volume = {4904}, pages = {86--98}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77444-0\_7}, doi = {10.1007/978-3-540-77444-0\_7}, timestamp = {Mon, 22 May 2023 09:50:35 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/ShareefR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/ShankarSR08, author = {Bhavani Shankar and Kannan Srinathan and C. Pandu Rangan}, editor = {Shrisha Rao and Mainak Chatterjee and Prasad Jayanti and C. Siva Ram Murthy and Sanjoy Kumar Saha}, title = {Alternative Protocols for Generalized Oblivious Transfer}, booktitle = {Distributed Computing and Networking, 9th International Conference, {ICDCN} 2008, Kolkata, India, January 5-8, 2008}, series = {Lecture Notes in Computer Science}, volume = {4904}, pages = {304--309}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77444-0\_31}, doi = {10.1007/978-3-540-77444-0\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/ShankarSR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ChoudharyPASR08, author = {Ashish Choudhary and Arpita Patra and B. V. Ashwinkumar and K. Srinathan and C. Pandu Rangan}, editor = {Reihaneh Safavi{-}Naini}, title = {Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {137--155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_15}, doi = {10.1007/978-3-540-85093-9\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ChoudharyPASR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PatraCR08, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen and Abhijit Das}, title = {Round Efficient Unconditionally Secure Multiparty Computation Protocol}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, pages = {185--199}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5\_15}, doi = {10.1007/978-3-540-89754-5\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PatraCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/MalekaSR08, author = {Shaik Maleka and Amjed Shareef and C. Pandu Rangan}, title = {The deterministic protocol for rational secret sharing}, booktitle = {22nd {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2008, Miami, Florida USA, April 14-18, 2008}, pages = {1--7}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IPDPS.2008.4536558}, doi = {10.1109/IPDPS.2008.4536558}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/MalekaSR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/MalekaSR08, author = {Shaik Maleka and Amjed Shareef and C. Pandu Rangan}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Rational Secret Sharing with Repeated Games}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {334--346}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_24}, doi = {10.1007/978-3-540-79104-1\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/MalekaSR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwoca/SivanHC08, author = {Balasubramanian Sivan and S. Harini and C. Pandu Rangan}, editor = {Mirka Miller and Koichi Wada}, title = {On Conditional Covering Problem}, booktitle = {Proceedings of the 19th International Workshop on Combinatorial Algorithms, {IWOCA} 2008, September 13-15, 2008, Nagoya, Japan}, pages = {224--238}, publisher = {College Publications}, year = {2008}, timestamp = {Fri, 19 Jan 2024 14:56:10 +0100}, biburl = {https://dblp.org/rec/conf/iwoca/SivanHC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/AshwinkumarPCSR08, author = {B. V. Ashwinkumar and Arpita Patra and Ashish Choudhary and Kannan Srinathan and C. Pandu Rangan}, editor = {Rida A. Bazzi and Boaz Patt{-}Shamir}, title = {On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary}, booktitle = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2008, Toronto, Canada, August 18-21, 2008}, pages = {115--124}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1400751.1400768}, doi = {10.1145/1400751.1400768}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/AshwinkumarPCSR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/SrinathanCPR08, author = {Kannan Srinathan and Ashish Choudhary and Arpita Patra and C. Pandu Rangan}, editor = {Rida A. Bazzi and Boaz Patt{-}Shamir}, title = {Efficient single phase unconditionally secure message transmission with optimum communication complexity}, booktitle = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2008, Toronto, Canada, August 18-21, 2008}, pages = {457}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1400751.1400855}, doi = {10.1145/1400751.1400855}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/SrinathanCPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/SelviVSC08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Deepanshu Shukla and C. Pandu Rangan}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Efficient and Provably Secure Certificateless Multi-receiver Signcryption}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {52--67}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_4}, doi = {10.1007/978-3-540-88733-1\_4}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/SelviVSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SelviVKGR08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Naga Naresh Karuturi and Ragavendran Gopalakrishnan and C. Pandu Rangan}, editor = {Larry Korba and Stephen Marsh and Reihaneh Safavi{-}Naini}, title = {Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption {(IBBSC)} Scheme for Wireless Ad-Hoc Networks}, booktitle = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada}, pages = {109--120}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PST.2008.29}, doi = {10.1109/PST.2008.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/SelviVKGR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PatraCR08, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {309--326}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_21}, doi = {10.1007/978-3-540-85855-3\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PatraCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/ShankarGSR08, author = {Bhavani Shankar and Prasant Gopal and Kannan Srinathan and C. Pandu Rangan}, editor = {Shang{-}Hua Teng}, title = {Unconditionally reliable message transmission in directed networks}, booktitle = {Proceedings of the Nineteenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2008, San Francisco, California, USA, January 20-22, 2008}, pages = {1048--1055}, publisher = {{SIAM}}, year = {2008}, url = {http://dl.acm.org/citation.cfm?id=1347082.1347197}, timestamp = {Fri, 07 Dec 2012 17:02:08 +0100}, biburl = {https://dblp.org/rec/conf/soda/ShankarGSR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SelviVGKR08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption {(IBBSC)} Scheme}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {115--129}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_9}, doi = {10.1007/978-3-642-00306-6\_9}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SelviVGKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCGR08, author = {Arpita Patra and Ashish Choudhary and Madhu Gayatri and C. Pandu Rangan}, title = {Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2008}, url = {http://eprint.iacr.org/2008/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCGR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCRS08, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan and Kannan Srinathan}, title = {Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2008}, url = {http://eprint.iacr.org/2008/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCRR08, author = {Arpita Patra and Ashish Choudhary and Tal Rabin and C. Pandu Rangan}, title = {The Round Complexity of Verifiable Secret Sharing Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2008}, url = {http://eprint.iacr.org/2008/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVGKR08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan}, title = {Provably Secure ID-Based Broadcast Signcryption {(IBBSC)} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2008}, url = {http://eprint.iacr.org/2008/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVGKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCASR08, author = {Arpita Patra and Ashish Choudhury and B. V. Ashwinkumar and Kannan Srinathan and C. Pandu Rangan}, title = {Perfectly Secure Message Transmission Tolerating Mixed Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2008}, url = {http://eprint.iacr.org/2008/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCASR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVGKR08a, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan}, title = {On the Provable Security of Multi-Receiver Signcryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2008}, url = {http://eprint.iacr.org/2008/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVGKR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVKGC08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Naga Naresh Karuturi and Ragavendran Gopalakrishnan and C. Pandu Rangan}, title = {Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption {(IBBSC)} Scheme for Wireless Ad-hoc Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2008}, url = {http://eprint.iacr.org/2008/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVKGC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR08, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan}, title = {Statistically Reliable and Secure Message Transmission in Directed Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2008}, url = {http://eprint.iacr.org/2008/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SKR08, author = {Chandrasekar S. and Ambika K. and C. Pandu Rangan}, title = {Signcryption with Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2008}, url = {http://eprint.iacr.org/2008/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KaruturiGSC08, author = {Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Rahul Srinivasan and C. Pandu Rangan}, title = {Foundations of Group Key Management - Framework, Security Model and a Generic Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2008}, url = {http://eprint.iacr.org/2008/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KaruturiGSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirtaneR08, author = {Varad Kirtane and C. Pandu Rangan}, title = {{RSA-TBOS} Signcryption with Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2008}, url = {http://eprint.iacr.org/2008/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirtaneR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVSC08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and C. Pandu Rangan}, title = {An Efficient Identity-Based Signcryption Scheme for Multiple Receivers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2008}, url = {http://eprint.iacr.org/2008/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVJC08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Neha Jain and C. Pandu Rangan}, title = {Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2008}, url = {http://eprint.iacr.org/2008/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVJC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirtaneR08a, author = {Varad Kirtane and C. Pandu Rangan}, title = {Side Channel Attack Resistant Implementation of Multi-Power {RSA} using Hensel Lifting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2008}, url = {http://eprint.iacr.org/2008/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirtaneR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SrinathanPCR08, author = {Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Reliable Message Transmission in Directed Hypergraphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2008}, url = {http://eprint.iacr.org/2008/371}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SrinathanPCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR08a, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Round Efficient Unconditionally Secure Multiparty Computation Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2008}, url = {http://eprint.iacr.org/2008/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR08b, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan}, title = {Efficient Asynchronous Byzantine Agreement with Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2008}, url = {http://eprint.iacr.org/2008/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR08c, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan}, title = {Efficient Asynchronous Multiparty Computation with Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2008}, url = {http://eprint.iacr.org/2008/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR08d, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Secure Multiparty Set Intersection Re-Visited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2008}, url = {http://eprint.iacr.org/2008/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SrinathanPCR08a, author = {Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2008}, url = {http://eprint.iacr.org/2008/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SrinathanPCR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SrinathanRC07, author = {Kannan Srinathan and Prasad Raghavendra and C. Pandu Rangan}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {On Proactive Perfectly Secure Message Transmission}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {461--473}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_33}, doi = {10.1007/978-3-540-73458-1\_33}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SrinathanRC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/KumarR07, author = {K. Anil Kumar and C. Pandu Rangan}, editor = {Reda Alhajj and Hong Gao and Xue Li and Jianzhong Li and Osmar R. Za{\"{\i}}ane}, title = {Privacy Preserving {DBSCAN} Algorithm for Clustering}, booktitle = {Advanced Data Mining and Applications, Third International Conference, {ADMA} 2007, Harbin, China, August 6-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4632}, pages = {57--68}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73871-8\_7}, doi = {10.1007/978-3-540-73871-8\_7}, timestamp = {Mon, 31 Aug 2020 16:04:32 +0200}, biburl = {https://dblp.org/rec/conf/adma/KumarR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/PrasadR07, author = {P. Krishna Prasad and C. Pandu Rangan}, editor = {Reda Alhajj and Hong Gao and Xue Li and Jianzhong Li and Osmar R. Za{\"{\i}}ane}, title = {Privacy Preserving {BIRCH} Algorithm for Clustering over Arbitrarily Partitioned Databases}, booktitle = {Advanced Data Mining and Applications, Third International Conference, {ADMA} 2007, Harbin, China, August 6-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4632}, pages = {146--157}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73871-8\_15}, doi = {10.1007/978-3-540-73871-8\_15}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adma/PrasadR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/PatraSCSR07, author = {Arpita Patra and Bhavani Shankar and Ashish Choudhary and K. Srinathan and C. Pandu Rangan}, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary}, booktitle = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, pages = {80--101}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9\_6}, doi = {10.1007/978-3-540-76969-9\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/PatraSCSR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmin/PrasadR07, author = {P. Krishna Prasad and C. Pandu Rangan}, editor = {Robert Stahlbock and Sven F. Crone and Stefan Lessmann}, title = {Privacy Preserving {CACTUS} Algorithm for Clustering over Vertically Partitioned Databases}, booktitle = {Proceedings of the 2007 International Conference on Data Mining, {DMIN} 2007, June 25-28, 2007, Las Vegas, Nevada, {USA}}, pages = {308--314}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Thu, 20 Dec 2007 11:10:11 +0100}, biburl = {https://dblp.org/rec/conf/dmin/PrasadR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/VaradarajanVR07, author = {Avinash V. Varadarajan and Ramarathnam Venkatesan and C. Pandu Rangan}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Data structures for limited oblivious execution of programs while preserving locality of reference}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {63--69}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314289}, doi = {10.1145/1314276.1314289}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/VaradarajanVR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/SrinathanRK07, author = {K. Srinathan and C. Pandu Rangan and Ranjit Kumaresan}, editor = {Yvo Desmedt}, title = {On Exponential Lower Bound for Protocols for Reliable Communication in Networks}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {89--98}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_7}, doi = {10.1007/978-3-642-10230-1\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/SrinathanRK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SrinathanPCR07, author = {Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {101--122}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_9}, doi = {10.1007/978-3-540-77026-8\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SrinathanPCR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/ShareefR07, author = {Amjed Shareef and C. Pandu Rangan}, editor = {Hamid R. Arabnia}, title = {Efficient Protocol For Approximate Agreement}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 2007, Las Vegas, Nevada, USA, June 25-28, 2007, Volume 1}, pages = {193--199}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 09:03:00 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/ShareefR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/PatraCR07, author = {Arpita Patra and Ashish Choudhary and Chandrasekaran Pandu Rangan}, editor = {Indranil Gupta and Roger Wattenhofer}, title = {Constant phase efficient protocols for secure message transmission in directed networks}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2007, Portland, Oregon, USA, August 12-15, 2007}, pages = {322--323}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1281100.1281153}, doi = {10.1145/1281100.1281153}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/PatraCR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SrinathanPR07, author = {Kannan Srinathan and N. R. Prasad and C. Pandu Rangan}, title = {On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {311--320}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.31}, doi = {10.1109/SP.2007.31}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/SrinathanPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/PatraCSR07, author = {Arpita Patra and Ashish Choudhary and Kannan Srinathan and C. Pandu Rangan}, editor = {Andrzej Pelc}, title = {Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary}, booktitle = {Distributed Computing, 21st International Symposium, {DISC} 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4731}, pages = {496--498}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75142-7\_43}, doi = {10.1007/978-3-540-75142-7\_43}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wdag/PatraCSR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2007, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8}, doi = {10.1007/978-3-540-77026-8}, isbn = {978-3-540-77025-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/NarayananSR06, author = {Arvind Narayanan and K. Srinathan and C. Pandu Rangan}, title = {Perfectly Reliable Message Transmission}, journal = {Inf. Process. Lett.}, volume = {100}, number = {1}, pages = {23--28}, year = {2006}, url = {https://doi.org/10.1016/j.ipl.2005.11.027}, doi = {10.1016/J.IPL.2005.11.027}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/NarayananSR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChakinalaKMNRS06, author = {R. C. Chakinala and Abishek Kumarasubramanian and R. Manokaran and Guevara Noubir and C. Pandu Rangan and Ravi Sundaram}, editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil Sallee}, title = {Steganographic Communication in Ordered Channels}, booktitle = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, series = {Lecture Notes in Computer Science}, volume = {4437}, pages = {42--57}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74124-4\_4}, doi = {10.1007/978-3-540-74124-4\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/ChakinalaKMNRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PatraCSR06, author = {Arpita Patra and Ashish Choudhary and K. Srinathan and C. Pandu Rangan}, editor = {Rana Barua and Tanja Lange}, title = {Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {221--235}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_16}, doi = {10.1007/11941378\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PatraCSR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/SrinathanR06, author = {Kannan Srinathan and C. Pandu Rangan}, editor = {Eric Ruppert and Dahlia Malkhi}, title = {Possibility and complexity of probabilistic reliable communication in directed networks}, booktitle = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2006, Denver, CO, USA, July 23-26, 2006}, pages = {265--274}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1146381.1146421}, doi = {10.1145/1146381.1146421}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/SrinathanR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/PrasadR06, author = {P. Krishna Prasad and C. Pandu Rangan}, editor = {Willem Jonker and Milan Petkovic}, title = {Privacy Preserving {BIRCH} Algorithm for Clustering over Vertically Partitioned Databases}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {84--99}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_7}, doi = {10.1007/11844662\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/PrasadR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaa/ChakinalaKLMRR06, author = {R. C. Chakinala and Abishek Kumarasubramanian and Kofi A. Laing and R. Manokaran and C. Pandu Rangan and Rajmohan Rajaraman}, editor = {Phillip B. Gibbons and Uzi Vishkin}, title = {Playing push vs pull: models and algorithms for disseminating dynamic data in networks}, booktitle = {{SPAA} 2006: Proceedings of the 18th Annual {ACM} Symposium on Parallelism in Algorithms and Architectures, Cambridge, Massachusetts, USA, July 30 - August 2, 2006}, pages = {244--253}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1148109.1148153}, doi = {10.1145/1148109.1148153}, timestamp = {Wed, 21 Nov 2018 11:13:10 +0100}, biburl = {https://dblp.org/rec/conf/spaa/ChakinalaKLMRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FitziGGRS06, author = {Matthias Fitzi and Juan A. Garay and Shyamnath Gollakota and C. Pandu Rangan and K. Srinathan}, editor = {Shai Halevi and Tal Rabin}, title = {Round-Optimal and Efficient Verifiable Secret Sharing}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {329--342}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_17}, doi = {10.1007/11681878\_17}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FitziGGRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SrinathanNR04, author = {K. Srinathan and Arvind Narayanan and C. Pandu Rangan}, editor = {Matthew K. Franklin}, title = {Optimal Perfectly Secure Message Transmission}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {545--561}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_33}, doi = {10.1007/978-3-540-28628-8\_33}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SrinathanNR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/RavikantMSSR04, author = {D. V. S. Ravikant and Muthuramakrishnan Venkitasubramaniam and V. Srikanth and K. Srinathan and C. Pandu Rangan}, editor = {Soma Chaudhuri and Shay Kutten}, title = {Brief announcement: on the round complexity of distributed consensus over synchronous networks}, booktitle = {Proceedings of the Twenty-Third Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2004, St. John's, Newfoundland, Canada, July 25-28, 2004}, pages = {397}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1011767.1011862}, doi = {10.1145/1011767.1011862}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/RavikantMSSR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/RavikantMSSR04, author = {D. V. S. Ravikant and Muthuramakrishnan Venkitasubramaniam and V. Srikanth and K. Srinathan and C. Pandu Rangan}, editor = {Rachid Guerraoui}, title = {On Byzantine Agreement over (2, 3)-Uniform Hypergraphs}, booktitle = {Distributed Computing, 18th International Conference, {DISC} 2004, Amsterdam, The Netherlands, October 4-7, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3274}, pages = {450--464}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30186-8\_32}, doi = {10.1007/978-3-540-30186-8\_32}, timestamp = {Wed, 07 Dec 2022 23:11:11 +0100}, biburl = {https://dblp.org/rec/conf/wdag/RavikantMSSR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Rangan04, author = {C. Pandu Rangan}, editor = {Dinesh P. Mehta and Sartaj Sahni}, title = {Skew Heaps}, booktitle = {Handbook of Data Structures and Applications}, publisher = {Chapman and Hall/CRC}, year = {2004}, url = {https://doi.org/10.1201/9781420035179.ch6}, doi = {10.1201/9781420035179.CH6}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crc/Rangan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Rangan04a, author = {C. Pandu Rangan}, editor = {Dinesh P. Mehta and Sartaj Sahni}, title = {Randomized Dictionary Structures}, booktitle = {Handbook of Data Structures and Applications}, publisher = {Chapman and Hall/CRC}, year = {2004}, url = {https://doi.org/10.1201/9781420035179.ch13}, doi = {10.1201/9781420035179.CH13}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crc/Rangan04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NarayananRK03, author = {Arvind Narayanan and C. Pandu Rangan and Kwangjo Kim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Practical Pay {TV} Schemes}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {192--203}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_17}, doi = {10.1007/3-540-45067-X\_17}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NarayananRK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/VinodNSRK03, author = {Vinod Vaikuntanathan and Arvind Narayanan and K. Srinathan and C. Pandu Rangan and Kwangjo Kim}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {On the Power of Computational Secret Sharing}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {162--176}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_12}, doi = {10.1007/978-3-540-24582-7\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/VinodNSRK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/AmitanandSSVR03, author = {S. Amitanand and I. Sanketh and K. Srinathan and Vinod Vaikuntanathan and C. Pandu Rangan}, editor = {Elizabeth Borowsky and Sergio Rajsbaum}, title = {Distributed consensus in the presence of sectional faults}, booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July 13-16, 2003}, pages = {202--210}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/872035.872065}, doi = {10.1145/872035.872065}, timestamp = {Sun, 10 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/AmitanandSSVR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/SrinathanVR03, author = {K. Srinathan and Vinod Vaikuntanathan and C. Pandu Rangan}, editor = {Elizabeth Borowsky and Sergio Rajsbaum}, title = {Brief announcement: efficient perfectly secure communication over synchronous networks}, booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July 13-16, 2003}, pages = {252}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/872035.872072}, doi = {10.1145/872035.872072}, timestamp = {Sun, 10 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/SrinathanVR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KumarSR02, author = {M. V. N. Ashwin Kumar and K. Srinathan and C. Pandu Rangan}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {497--512}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_37}, doi = {10.1007/3-540-45450-0\_37}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KumarSR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SrinathanKR02, author = {K. Srinathan and M. V. N. Ashwin Kumar and C. Pandu Rangan}, editor = {Yuliang Zheng}, title = {Asynchronous Secure Communication Tolerating Mixed Adversaries}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {224--242}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_14}, doi = {10.1007/3-540-36178-2\_14}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/SrinathanKR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/SrinathanGKNR02, author = {K. Srinathan and Pranava R. Goundan and M. V. N. Ashwin Kumar and R. Nandakumar and C. Pandu Rangan}, editor = {Oscar H. Ibarra and Louxin Zhang}, title = {Theory of Equal-Flows in Networks}, booktitle = {Computing and Combinatorics, 8th Annual International Conference, {COCOON} 2002, Singapore, August 15-17, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2387}, pages = {514--524}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45655-4\_55}, doi = {10.1007/3-540-45655-4\_55}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/SrinathanGKNR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PrabhuSR02, author = {B. Prabhu and K. Srinathan and C. Pandu Rangan}, editor = {Alfred Menezes and Palash Sarkar}, title = {Asynchronous Unconditionally Secure Computation: An Efficiency Improvement}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {93--107}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_9}, doi = {10.1007/3-540-36231-2\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PrabhuSR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SrinathanRR02, author = {K. Srinathan and N. Tharani Rajan and C. Pandu Rangan}, editor = {Alfred Menezes and Palash Sarkar}, title = {Non-perfect Secret Sharing over General Access Structures}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {409--421}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_32}, doi = {10.1007/3-540-36231-2\_32}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SrinathanRR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/KumarGSR02, author = {M. V. N. Ashwin Kumar and Pranava R. Goundan and K. Srinathan and C. Pandu Rangan}, editor = {Aleta Ricciardi}, title = {On perfectly secure cmmunication over arbitrary networks}, booktitle = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2002, Monterey, California, USA, July 21-24, 2002}, pages = {193--202}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/571825.571858}, doi = {10.1145/571825.571858}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/KumarGSR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PrabhuSR02, author = {B. Prabhu and K. Srinathan and C. Pandu Rangan}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Trading Players for Efficiency in Unconditional Multiparty Computation}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {342--353}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_25}, doi = {10.1007/3-540-36413-7\_25}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/PrabhuSR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/GuruswamiRCCW01, author = {Venkatesan Guruswami and C. Pandu Rangan and Maw{-}Shang Chang and Gerard J. Chang and C. K. Wong}, title = {The K\({}_{\mbox{r}}\)-Packing Problem}, journal = {Computing}, volume = {66}, number = {1}, pages = {79--89}, year = {2001}, url = {https://doi.org/10.1007/s006070170039}, doi = {10.1007/S006070170039}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/GuruswamiRCCW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SrinathanRK01, author = {K. Srinathan and C. Pandu Rangan and V. Kamakoti}, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {Toward Optimal Player Weights in Secure Distributed Protocols}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, pages = {232--241}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3\_22}, doi = {10.1007/3-540-45311-3\_22}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SrinathanRK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2001, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3}, doi = {10.1007/3-540-45311-3}, isbn = {3-540-43010-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/GuruswamiR00, author = {Venkatesan Guruswami and C. Pandu Rangan}, title = {Algorithmic aspects of clique-transversal and clique-independent sets}, journal = {Discret. Appl. Math.}, volume = {100}, number = {3}, pages = {183--202}, year = {2000}, url = {https://doi.org/10.1016/S0166-218X(99)00159-6}, doi = {10.1016/S0166-218X(99)00159-6}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/GuruswamiR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ita/KumarR00, author = {D. Arun Kumar and C. Pandu Rangan}, title = {Approximation algorithms for the Traveling Salesman Problem with range condition}, journal = {{RAIRO} Theor. Informatics Appl.}, volume = {34}, number = {3}, pages = {173--182}, year = {2000}, url = {https://doi.org/10.1051/ita:2000113}, doi = {10.1051/ITA:2000113}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ita/KumarR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jalc/SubramanianTKR00, author = {Lakshminarayanan Subramanian and Muralidhar Talupur and Kamala Krithivasan and C. Pandu Rangan}, title = {On the Generative Power of Simple {H} Systems}, journal = {J. Autom. Lang. Comb.}, volume = {5}, number = {4}, pages = {457--473}, year = {2000}, url = {https://doi.org/10.25596/jalc-2000-457}, doi = {10.25596/JALC-2000-457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jalc/SubramanianTKR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/order/FelsnerKRW00, author = {Stefan Felsner and Ravi Kant and C. Pandu Rangan and Dorothea Wagner}, title = {On the Complexity of Partial Order Properties}, journal = {Order}, volume = {17}, number = {2}, pages = {179--193}, year = {2000}, url = {https://doi.org/10.1023/A:1006422023869}, doi = {10.1023/A:1006422023869}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/order/FelsnerKRW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SrinathanR00, author = {K. Srinathan and C. Pandu Rangan}, editor = {Bimal K. Roy and Eiji Okamoto}, title = {Efficient Asynchronous Secure Multiparty Distributed Computation}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1977}, pages = {117--129}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44495-5\_11}, doi = {10.1007/3-540-44495-5\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SrinathanR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SrinathanR00a, author = {K. Srinathan and C. Pandu Rangan}, editor = {Bimal K. Roy and Eiji Okamoto}, title = {Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1977}, pages = {130--142}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44495-5\_12}, doi = {10.1007/3-540-44495-5\_12}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SrinathanR00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ArvindR99, author = {A. Arvind and C. Pandu Rangan}, title = {Symmetric Min-Max Heap: {A} Simpler Data Structure for Double-Ended Priority Queue}, journal = {Inf. Process. Lett.}, volume = {69}, number = {4}, pages = {197--199}, year = {1999}, url = {https://doi.org/10.1016/S0020-0190(99)00014-9}, doi = {10.1016/S0020-0190(99)00014-9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ArvindR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fsttcs/1999, editor = {C. Pandu Rangan and Venkatesh Raman and Ramaswamy Ramanujam}, title = {Foundations of Software Technology and Theoretical Computer Science, 19th Conference, Chennai, India, December 13-15, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1738}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46691-6}, doi = {10.1007/3-540-46691-6}, isbn = {3-540-66836-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isaac/1999, editor = {Alok Aggarwal and C. Pandu Rangan}, title = {Algorithms and Computation, 10th International Symposium, {ISAAC} '99, Chennai, India, December 16-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1741}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46632-0}, doi = {10.1007/3-540-46632-0}, isbn = {3-540-66916-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isaac/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/arscom/RanganPP98, author = {C. Pandu Rangan and K. R. Parthasarathy and V. Prakash}, title = {On The g-centroidal Problem in Special Classes of Perfect Graphs}, journal = {Ars Comb.}, volume = {50}, year = {1998}, timestamp = {Fri, 09 Jan 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/arscom/RanganPP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/KirkpatrickRRS98, author = {David G. Kirkpatrick and Madhukar K. Reddy and C. Pandu Rangan and Anand Srinivasan}, title = {Partial and Perfect Path Covers of Cographs}, journal = {Discret. Appl. Math.}, volume = {89}, number = {1-3}, pages = {143--153}, year = {1998}, url = {https://doi.org/10.1016/S0166-218X(98)00101-2}, doi = {10.1016/S0166-218X(98)00101-2}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/KirkpatrickRRS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ChangNR98, author = {Maw{-}Shang Chang and P. Nagavamsi and C. Pandu Rangan}, title = {Weighted Irredundance of Interval Graphs}, journal = {Inf. Process. Lett.}, volume = {66}, number = {2}, pages = {65--70}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(98)00040-4}, doi = {10.1016/S0020-0190(98)00040-4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ChangNR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GuruswamiR98, author = {Venkatesan Guruswami and C. Pandu Rangan}, title = {A Natural Family of Optimization Problems with Arbitrarily Small Approximation Thresholds}, journal = {Inf. Process. Lett.}, volume = {68}, number = {5}, pages = {241--248}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(98)00169-0}, doi = {10.1016/S0020-0190(98)00169-0}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/GuruswamiR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/GrafKLR98, author = {Thomas Graf and V. Kamakoti and N. S. Janaki Latha and C. Pandu Rangan}, editor = {Wen{-}Lian Hsu and Ming{-}Yang Kao}, title = {The Colored Sector Search Tree: {A} Dynamic Data Structure for Efficient High Dimensional Nearest-Foreign-Neighbor Queries}, booktitle = {Computing and Combinatorics, 4th Annual International Conference, {COCOON} '98, Taipei, Taiwan, R.o.C., August 12-14, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1449}, pages = {35--44}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68535-9\_7}, doi = {10.1007/3-540-68535-9\_7}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/GrafKLR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/swat/SridharRR98, author = {Sridhar Ramachandran and K. Rajasekar and C. Pandu Rangan}, editor = {Stefan Arnborg and Lars Ivansson}, title = {Probabilistic Data Structures for Priority Queues (Extended Abstract)}, booktitle = {Algorithm Theory - {SWAT} '98, 6th Scandinavian Workshop on Algorithm Theory, Stockholm, Sweden, July, 8-10, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1432}, pages = {143--154}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054362}, doi = {10.1007/BFB0054362}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/swat/SridharRR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wg/GuruswamiRCCW98, author = {Venkatesan Guruswami and C. Pandu Rangan and Maw{-}Shang Chang and Gerard J. Chang and C. K. Wong}, editor = {Juraj Hromkovic and Ondrej S{\'{y}}kora}, title = {The Vertex-Disjoint Triangles Problem}, booktitle = {Graph-Theoretic Concepts in Computer Science, 24th International Workshop, {WG} '98, Smolenice Castle, Slovak Republic, June 18-20, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1517}, pages = {26--37}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10692760\_3}, doi = {10.1007/10692760\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/wg/GuruswamiRCCW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/VenkatesanRMMR97, author = {G. Venkatesan and Udi Rotics and M. S. Madanlal and Johann A. Makowsky and C. Pandu Rangan}, title = {Restrictions of Minimum Spanner Problems}, journal = {Inf. Comput.}, volume = {136}, number = {2}, pages = {143--164}, year = {1997}, url = {https://doi.org/10.1006/inco.1997.2641}, doi = {10.1006/INCO.1997.2641}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/VenkatesanRMMR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipc/GrafKLR97, author = {Thomas Graf and V. Kamakoti and N. S. Janaki Latha and C. Pandu Rangan}, title = {An optimal parallel algorithm for the all-nearest-foreign-neighbors problem in arbitrary dimensions}, booktitle = {Proceedings of the Fourth International on High-Performance Computing, HiPC 1997, Bangalore, India, 18-21 December, 1997}, pages = {132--136}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/HIPC.1997.634483}, doi = {10.1109/HIPC.1997.634483}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipc/GrafKLR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/EaswarakumarKRS96, author = {K. S. Easwarakumar and S. V. Krishnan and C. Pandu Rangan and S. Seshadri}, title = {Optimal Parallel Algorithm for Finding st-Ambitus of a Planar Biconnected Graph}, journal = {Algorithmica}, volume = {15}, number = {3}, pages = {242--255}, year = {1996}, url = {https://doi.org/10.1007/BF01975868}, doi = {10.1007/BF01975868}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/EaswarakumarKRS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/SatyanR96, author = {Satyan R. Coorg and C. Pandu Rangan}, title = {The Parity Path Problem on Some Subclasses of Perfect Graphs}, journal = {Discret. Appl. Math.}, volume = {68}, number = {3}, pages = {293--302}, year = {1996}, url = {https://doi.org/10.1016/0166-218X(95)00065-Y}, doi = {10.1016/0166-218X(95)00065-Y}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/SatyanR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/BalachandhranR96, author = {V. Balachandhran and C. Pandu Rangan}, title = {All-pairs-shortest-length on Strongly Chordal Graphs}, journal = {Discret. Appl. Math.}, volume = {69}, number = {1-2}, pages = {169--182}, year = {1996}, url = {https://doi.org/10.1016/0166-218X(95)00088-9}, doi = {10.1016/0166-218X(95)00088-9}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/BalachandhranR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BalachandranNR96, author = {V. Balachandran and P. Nagavamsi and C. Pandu Rangan}, title = {Clique Transversal and Clique Independence on Comparability Graphs}, journal = {Inf. Process. Lett.}, volume = {58}, number = {4}, pages = {181--184}, year = {1996}, url = {https://doi.org/10.1016/0020-0190(96)00054-3}, doi = {10.1016/0020-0190(96)00054-3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BalachandranNR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MadanlalVR96, author = {M. S. Madanlal and G. Venkatesan and C. Pandu Rangan}, title = {Tree 3-Spanners on Interval, Permutation and Regular Bipartite Graphs}, journal = {Inf. Process. Lett.}, volume = {59}, number = {2}, pages = {97--102}, year = {1996}, url = {https://doi.org/10.1016/0020-0190(96)00078-6}, doi = {10.1016/0020-0190(96)00078-6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/MadanlalVR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/AranhaR96, author = {Rohan F. M. Aranha and C. Pandu Rangan}, title = {An Efficient Distributed Algorithm for Centering a Spanning Tree of a Biconnected Graph}, journal = {Inf. Process. Lett.}, volume = {59}, number = {3}, pages = {145--150}, year = {1996}, url = {https://doi.org/10.1016/0020-0190(96)00102-0}, doi = {10.1016/0020-0190(96)00102-0}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/AranhaR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/VenkatesanR96, author = {G. Venkatesan and C. Pandu Rangan}, title = {Approximate Triclique Coloring for Register Allocation}, journal = {Inf. Process. Lett.}, volume = {60}, number = {5}, pages = {249--253}, year = {1996}, url = {https://doi.org/10.1016/S0020-0190(96)00174-3}, doi = {10.1016/S0020-0190(96)00174-3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/VenkatesanR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/ChangRC95, author = {Gerard J. Chang and C. Pandu Rangan and Satyan R. Coorg}, title = {Weighted Independent Perfect Domination on Cocomparability Graphs}, journal = {Discret. Appl. Math.}, volume = {63}, number = {3}, pages = {215--222}, year = {1995}, url = {https://doi.org/10.1016/0166-218X(94)00067-3}, doi = {10.1016/0166-218X(94)00067-3}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/ChangRC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dmgt/GopalakrishnanR95, author = {C. P. Gopalakrishnan and C. Pandu Rangan}, title = {Edge-disjoint paths in permutation graphs}, journal = {Discuss. Math. Graph Theory}, volume = {15}, number = {1}, pages = {59--72}, year = {1995}, url = {https://doi.org/10.7151/dmgt.1007}, doi = {10.7151/DMGT.1007}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dmgt/GopalakrishnanR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dmgt/GopalakrishnanRC95, author = {C. P. Gopalakrishnan and C. Pandu Rangan and Satyan R. Coorg}, title = {Efficient algorithms for minimal disjoint path problems on chordal graphs}, journal = {Discuss. Math. Graph Theory}, volume = {15}, number = {2}, pages = {119--145}, year = {1995}, url = {https://doi.org/10.7151/dmgt.1012}, doi = {10.7151/DMGT.1012}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dmgt/GopalakrishnanRC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dmgt/GopalakrishnanR95a, author = {C. P. Gopalakrishnan and C. Pandu Rangan}, title = {A linear algorithms for the two paths problem on permutation graphs}, journal = {Discuss. Math. Graph Theory}, volume = {15}, number = {2}, pages = {147--166}, year = {1995}, url = {https://doi.org/10.7151/dmgt.1013}, doi = {10.7151/DMGT.1013}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dmgt/GopalakrishnanR95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MaheshMR95, author = {Saptarshi Mahesh and C. Siva Ram Murthy and C. Pandu Rangan}, title = {Efficient Dynamic Job Scheduling Algorithms for Multiprocessor Systems}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {78-D}, number = {1}, pages = {3--12}, year = {1995}, url = {http://search.ieice.org/bin/summary.php?id=e78-d\_1\_3}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MaheshMR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/MaheshMGR95, author = {Sathi Mahesh and C. Siva Ram Murthy and T. A. Gonsalves and C. Pandu Rangan}, title = {Modeling and simulation of dynamic job scheduling in multiprocessor systems}, journal = {Int. J. Comput. Math.}, volume = {58}, number = {3-4}, pages = {221--247}, year = {1995}, url = {https://doi.org/10.1080/00207169508804445}, doi = {10.1080/00207169508804445}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/MaheshMGR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/SrinivasanMNRC95, author = {Anand Srinivasan and K. Madhukar and P. Nagavamsi and C. Pandu Rangan and Maw{-}Shang Chang}, title = {Edge Domination on Bipartite Permutation Graphs and Cotriangulated Graphs}, journal = {Inf. Process. Lett.}, volume = {56}, number = {3}, pages = {165--171}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(95)94093-8}, doi = {10.1016/0020-0190(95)94093-8}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/SrinivasanMNRC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ita/BalayoganR95, author = {V. B. Balayogan and C. Pandu Rangan}, title = {Parallel Algorithms on Interval Graphs}, journal = {{RAIRO} Theor. Informatics Appl.}, volume = {29}, number = {6}, pages = {451--470}, year = {1995}, url = {https://doi.org/10.1051/ita/1995290604511}, doi = {10.1051/ITA/1995290604511}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ita/BalayoganR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/ArvindKR95, author = {K. Arvind and V. Kamakoti and C. Pandu Rangan}, title = {Efficient Parallel Algorithms for Permutation Graphs}, journal = {J. Parallel Distributed Comput.}, volume = {26}, number = {1}, pages = {116--124}, year = {1995}, url = {https://doi.org/10.1006/jpdc.1995.1052}, doi = {10.1006/JPDC.1995.1052}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/ArvindKR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/AranhaR95, author = {Rohan F. M. Aranha and C. Pandu Rangan}, title = {An Efficient Distributed Algorithm For st-numbering The Verices Of {A} Biconnected Graph}, journal = {J. Univers. Comput. Sci.}, volume = {1}, number = {9}, pages = {633--650}, year = {1995}, url = {https://doi.org/10.3217/jucs-001-09-0633}, doi = {10.3217/JUCS-001-09-0633}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/AranhaR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/networks/CoorgR95, author = {Satyan R. Coorg and C. Pandu Rangan}, title = {Feedback vertex set on cocomparability graphs}, journal = {Networks}, volume = {26}, number = {2}, pages = {101--111}, year = {1995}, url = {https://doi.org/10.1002/net.3230260205}, doi = {10.1002/NET.3230260205}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/networks/CoorgR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/njc/KamakotiKR95, author = {V. Kamakoti and Kamala Krithivasan and C. Pandu Rangan}, title = {An Efficient Randomized Algorithm for the Closest Pair Problem on Colored Point Sets}, journal = {Nord. J. Comput.}, volume = {2}, number = {1}, pages = {28--40}, year = {1995}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/njc/KamakotiKR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppl/MaheshMR95, author = {Sathi Mahesh and C. Siva Ram Murthy and C. Pandu Rangan}, title = {Performance Bounds for Static Multiprocessor Scheduling of Multi-Task Jobs}, journal = {Parallel Process. Lett.}, volume = {5}, pages = {343--355}, year = {1995}, url = {https://doi.org/10.1142/S0129626495000321}, doi = {10.1142/S0129626495000321}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppl/MaheshMR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/MadhukarKRS95, author = {K. Madhukar and D. Pavan Kumar and C. Pandu Rangan and R. Sundar}, title = {Systematic Design of an Algorithm for Biconnected Components}, journal = {Sci. Comput. Program.}, volume = {25}, number = {1}, pages = {63--77}, year = {1995}, url = {https://doi.org/10.1016/0167-6423(95)00005-D}, doi = {10.1016/0167-6423(95)00005-D}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/MadhukarKRS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SrikrishnaR95, author = {G. Srikrishna and C. Pandu Rangan}, title = {Optimal Parallel Algorithms for Path Problems on Planar Graphs}, journal = {Theor. Comput. Sci.}, volume = {145}, number = {1{\&}2}, pages = {27--43}, year = {1995}, url = {https://doi.org/10.1016/0304-3975(94)00189-P}, doi = {10.1016/0304-3975(94)00189-P}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/SrikrishnaR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/KamakotiKR95, author = {V. Kamakoti and Kamala Krithivasan and C. Pandu Rangan}, editor = {Ding{-}Zhu Du and Ming Li}, title = {Efficient Randomized Incremental Algorithm For The Closest Pair Problem Using Leafary Trees}, booktitle = {Computing and Combinatorics, First Annual International Conference, {COCOON} '95, Xi'an, China, August 24-26, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {959}, pages = {71--80}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0030821}, doi = {10.1007/BFB0030821}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/KamakotiKR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/EaswarakumarRC94, author = {K. S. Easwarakumar and C. Pandu Rangan and Grant A. Cheston}, title = {A Linear Algorithm for Centering a Spanning Tree of a Biconnected Graph}, journal = {Inf. Process. Lett.}, volume = {51}, number = {3}, pages = {121--124}, year = {1994}, url = {https://doi.org/10.1016/0020-0190(94)00066-2}, doi = {10.1016/0020-0190(94)00066-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/EaswarakumarRC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppl/NivatRRSS94, author = {Maurice Nivat and G. D. S. Ramkumar and C. Pandu Rangan and Ahmed Saoudi and Ravi Sundaram}, title = {Efficient Parallel Shuffle Recognition}, journal = {Parallel Process. Lett.}, volume = {4}, pages = {455--463}, year = {1994}, url = {https://doi.org/10.1142/S0129626494000429}, doi = {10.1142/S0129626494000429}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppl/NivatRRSS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/SundaramSR94, author = {Ravi Sundaram and Karan Sher Singh and C. Pandu Rangan}, title = {Treewidth of Circular-Arc Graphs}, journal = {{SIAM} J. Discret. Math.}, volume = {7}, number = {4}, pages = {647--655}, year = {1994}, url = {https://doi.org/10.1137/S0895480191193789}, doi = {10.1137/S0895480191193789}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/SundaramSR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/MohanKR94, author = {P. Jagan Mohan and V. Kamakoti and C. Pandu Rangan}, editor = {Bj{\"{o}}rn Pehrson and Imre Simon}, title = {Efficient Randomized Parallel Algorithm for the Closest Pair Problem in D-dimension}, booktitle = {Technology and Foundations - Information Processing '94, Volume 1, Proceedings of the {IFIP} 13th World Computer Congress, Hamburg, Germany, 28 August - 2 September, 1994}, series = {{IFIP} Transactions}, volume = {{A-51}}, pages = {547--552}, publisher = {North-Holland}, year = {1994}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip/MohanKR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/GopalakrishnanR94, author = {C. P. Gopalakrishnan and C. Pandu Rangan}, editor = {Ding{-}Zhu Du and Xiang{-}Sun Zhang}, title = {Edge-Disjoint Paths in Permutation Graphs}, booktitle = {Algorithms and Computation, 5th International Symposium, {ISAAC} '94, Beijing, P. R. China, August 25-27, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {834}, pages = {208--216}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58325-4\_183}, doi = {10.1007/3-540-58325-4\_183}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/GopalakrishnanR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/RanganC94, author = {C. Pandu Rangan and Maw{-}Shang Chang}, editor = {Ding{-}Zhu Du and Xiang{-}Sun Zhang}, title = {Weighted Irredundance of Interval Graphs}, booktitle = {Algorithms and Computation, 5th International Symposium, {ISAAC} '94, Beijing, P. R. China, August 25-27, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {834}, pages = {567--574}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58325-4\_224}, doi = {10.1007/3-540-58325-4\_224}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isaac/RanganC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/RamprasadR93, author = {P. B. Ramprasad and C. Pandu Rangan}, title = {A Linear Algorithm for the All-Bidirectional-Edges Problem on Planar Graphs}, journal = {Algorithmica}, volume = {9}, number = {3}, pages = {199--216}, year = {1993}, url = {https://doi.org/10.1007/BF01190896}, doi = {10.1007/BF01190896}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/RamprasadR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppl/RamanR93, author = {Arjun Raman and C. Pandu Rangan}, title = {A Unified Approach to Parallel Algorithms for the Domatic Partition Problem on Special Classes of Perfect Graphs}, journal = {Parallel Process. Lett.}, volume = {3}, pages = {233--241}, year = {1993}, url = {https://doi.org/10.1142/S0129626493000277}, doi = {10.1142/S0129626493000277}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppl/RamanR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SrikantSSR93, author = {R. Srikant and Ravi Sundaram and Karan Sher Singh and C. Pandu Rangan}, title = {Optimal Path Cover Problem on Block Graphs and Bipartite Permutation Graphs}, journal = {Theor. Comput. Sci.}, volume = {115}, number = {2}, pages = {351--357}, year = {1993}, url = {https://doi.org/10.1016/0304-3975(93)90123-B}, doi = {10.1016/0304-3975(93)90123-B}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/SrikantSSR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/ChangRC93, author = {Gerard J. Chang and C. Pandu Rangan and Satyan R. Coorg}, editor = {Kam{-}Wing Ng and Prabhakar Raghavan and N. V. Balasubramanian and Francis Y. L. Chin}, title = {Weighted Independent Perfect Domination on Cocomparability Graphs}, booktitle = {Algorithms and Computation, 4th International Symposium, {ISAAC} '93, Hong Kong, December 15-17, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {762}, pages = {506--514}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57568-5\_282}, doi = {10.1007/3-540-57568-5\_282}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/ChangRC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wads/BalakrishnanRR93, author = {Hari Balakrishnan and Anand Rajaraman and C. Pandu Rangan}, editor = {Frank K. H. A. Dehne and J{\"{o}}rg{-}R{\"{u}}diger Sack and Nicola Santoro and Sue Whitesides}, title = {Connected Domination and Steiner Set on Asteroidal Triple-Free Graphs}, booktitle = {Algorithms and Data Structures, Third Workshop, {WADS} '93, Montr{\'{e}}al, Canada, August 11-13, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {709}, pages = {131--141}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57155-8\_242}, doi = {10.1007/3-540-57155-8\_242}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/wads/BalakrishnanRR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/RanganG92, author = {C. Pandu Rangan and Ramesh Govindan}, title = {An O(n log n) algorithm for a maxmin location problem}, journal = {Discret. Appl. Math.}, volume = {36}, number = {2}, pages = {203--205}, year = {1992}, url = {https://doi.org/10.1016/0166-218X(92)90234-2}, doi = {10.1016/0166-218X(92)90234-2}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/RanganG92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/MaratheRR92, author = {Madhav V. Marathe and R. Ravi and C. Pandu Rangan}, title = {Generalized Vertex Covering in Interval Graphs}, journal = {Discret. Appl. Math.}, volume = {39}, number = {1}, pages = {87--93}, year = {1992}, url = {https://doi.org/10.1016/0166-218X(92)90116-R}, doi = {10.1016/0166-218X(92)90116-R}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/MaratheRR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/KamakotiR92, author = {V. Kamakoti and C. Pandu Rangan}, title = {An Optimal Algorithm for Reconstructing a Binary Tree}, journal = {Inf. Process. Lett.}, volume = {42}, number = {2}, pages = {113--115}, year = {1992}, url = {https://doi.org/10.1016/0020-0190(92)90099-H}, doi = {10.1016/0020-0190(92)90099-H}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/KamakotiR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/networks/RaviMR92, author = {R. Ravi and Madhav V. Marathe and C. Pandu Rangan}, title = {An optimal algorithm to solve the all-pair shortest path problem on interval graphs}, journal = {Networks}, volume = {22}, number = {1}, pages = {21--35}, year = {1992}, url = {https://doi.org/10.1002/net.3230220103}, doi = {10.1002/NET.3230220103}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/networks/RaviMR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/SaoudiNRSR92, author = {Ahmed Saoudi and Maurice Nivat and C. Pandu Rangan and Ravi Sundaram and G. D. S. Ramkumar}, editor = {Viktor K. Prasanna and Larry H. Canter}, title = {A Parallel Algorithm for Recognizing the Shuffle of Two Strings}, booktitle = {Proceedings of the 6th International Parallel Processing Symposium, Beverly Hills, CA, USA, March 1992}, pages = {112--115}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/IPPS.1992.223062}, doi = {10.1109/IPPS.1992.223062}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/SaoudiNRSR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bit/ArikatiRM91, author = {Srinivasa Rao Arikati and C. Pandu Rangan and Glenn K. Manacher}, title = {Efficient Reduction for Path Problems on Circular-Arc Graphs}, journal = {{BIT}}, volume = {31}, number = {2}, pages = {181--193}, year = {1991}, url = {https://doi.org/10.1007/BF01931279}, doi = {10.1007/BF01931279}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bit/ArikatiRM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/ArikatiR91, author = {Srinivasa Rao Arikati and C. Pandu Rangan}, title = {An efficient algorithm for finding a two-pair, and its applications}, journal = {Discret. Appl. Math.}, volume = {31}, number = {1}, pages = {71--74}, year = {1991}, url = {https://doi.org/10.1016/0166-218X(91)90033-S}, doi = {10.1016/0166-218X(91)90033-S}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/ArikatiR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/MaheshPS91, author = {R. Mahesh and C. Pandu Rangan and Aravind Srinivasan}, title = {On Finding the Minimum Bandwidth of Interval Graphs}, journal = {Inf. Comput.}, volume = {95}, number = {2}, pages = {218--224}, year = {1991}, url = {https://doi.org/10.1016/0890-5401(91)90045-4}, doi = {10.1016/0890-5401(91)90045-4}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/MaheshPS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SrinivasanR91, author = {Aravind Srinivasan and C. Pandu Rangan}, title = {Efficient Algorithms for the Minimum Weighted Dominating Clique Problem on Permutation Graphs}, journal = {Theor. Comput. Sci.}, volume = {91}, number = {1}, pages = {1--21}, year = {1991}, url = {https://doi.org/10.1016/0304-3975(91)90265-4}, doi = {10.1016/0304-3975(91)90265-4}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/SrinivasanR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wads/SundaramSR91, author = {Ravi Sundaram and Karan Sher Singh and C. Pandu Rangan}, editor = {Frank K. H. A. Dehne and J{\"{o}}rg{-}R{\"{u}}diger Sack and Nicola Santoro}, title = {Treewidth of Circular-Arc Graphs (Abstract)}, booktitle = {Algorithms and Data Structures, 2nd Workshop {WADS} '91, Ottawa, Canada, August 14-16, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {519}, pages = {41}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/BFb0028248}, doi = {10.1007/BFB0028248}, timestamp = {Fri, 17 Jul 2020 16:12:48 +0200}, biburl = {https://dblp.org/rec/conf/wads/SundaramSR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/SudarshanR90, author = {S. Sudarshan and C. Pandu Rangan}, title = {A Fast Algorithm for Computing Sparse Visibility Graphs}, journal = {Algorithmica}, volume = {5}, number = {2}, pages = {210--214}, year = {1990}, url = {https://doi.org/10.1007/BF01840385}, doi = {10.1007/BF01840385}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/SudarshanR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/RamalingamR90, author = {G. Ramalingam and C. Pandu Rangan}, title = {New Sequential and Parallel Algorithms for Interval Graph Recognition}, journal = {Inf. Process. Lett.}, volume = {34}, number = {4}, pages = {215--219}, year = {1990}, url = {https://doi.org/10.1016/0020-0190(90)90163-R}, doi = {10.1016/0020-0190(90)90163-R}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/RamalingamR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ArikatiR90, author = {Srinivasa Rao Arikati and C. Pandu Rangan}, title = {Linear Algorithm for Optimal Path Cover Problem on Interval Graphs}, journal = {Inf. Process. Lett.}, volume = {35}, number = {3}, pages = {149--153}, year = {1990}, url = {https://doi.org/10.1016/0020-0190(90)90064-5}, doi = {10.1016/0020-0190(90)90064-5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ArikatiR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/RamkumarR90, author = {G. D. S. Ramkumar and C. Pandu Rangan}, editor = {Pen{-}Chung Yew}, title = {Parallel Algorithms on Interval Graphs}, booktitle = {Proceedings of the 1990 International Conference on Parallel Processing, Urbana-Champaign, IL, USA, August 1990. Volume 3: Algorithms and Applications}, pages = {72--74}, publisher = {Pennsylvania State University Press}, year = {1990}, timestamp = {Mon, 15 Jun 2015 19:00:07 +0200}, biburl = {https://dblp.org/rec/conf/icpp/RamkumarR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/RaoR89, author = {A. Srinivasa Rao and C. Pandu Rangan}, title = {Linear Algorithm for Domatic Number Problem on Interval Graphs}, journal = {Inf. Process. Lett.}, volume = {33}, number = {1}, pages = {29--33}, year = {1989}, url = {https://doi.org/10.1016/0020-0190(89)90184-1}, doi = {10.1016/0020-0190(89)90184-1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/RaoR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/RaoR89a, author = {A. Srinivasa Rao and C. Pandu Rangan}, title = {Optimal Parallel Algorithms on Circular-Arc Graphs}, journal = {Inf. Process. Lett.}, volume = {33}, number = {3}, pages = {147--156}, year = {1989}, url = {https://doi.org/10.1016/0020-0190(89)90195-6}, doi = {10.1016/0020-0190(89)90195-6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/RaoR89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ita/VenkatasubramanianKR89, author = {Suresh Venkatasubramanian and Kamala Krithivasan and C. Pandu Rangan}, title = {Algorithms for Weighted Graph Problems on The Modified Cellular Graph Automaton}, journal = {{RAIRO} Theor. Informatics Appl.}, volume = {23}, number = {3}, pages = {251--279}, year = {1989}, url = {https://doi.org/10.1051/ita/1989230302511}, doi = {10.1051/ITA/1989230302511}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ita/VenkatasubramanianKR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/RaoR89, author = {A. Srinivasa Rao and C. Pandu Rangan}, editor = {C. E. Veni Madhavan}, title = {Optimal Parallel Algorithms on Circular-Arc Graphs}, booktitle = {Foundations of Software Technology and Theoretical Computer Science, Ninth Conference, Bangalore, India, December 19-21, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {405}, pages = {44--55}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-52048-1\_31}, doi = {10.1007/3-540-52048-1\_31}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/RaoR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wads/RaoR89, author = {A. Srinivasa Rao and C. Pandu Rangan}, editor = {Frank K. H. A. Dehne and J{\"{o}}rg{-}R{\"{u}}diger Sack and Nicola Santoro}, title = {Linear Algorithms for Parity Path and Two Path Problems on Circular-Arc Graph}, booktitle = {Algorithms and Data Structures, Workshop {WADS} '89, Ottawa, Canada, August 17-19, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {382}, pages = {267--290}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-51542-9\_24}, doi = {10.1007/3-540-51542-9\_24}, timestamp = {Fri, 17 Jul 2020 16:12:48 +0200}, biburl = {https://dblp.org/rec/conf/wads/RaoR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/RamalingamR88, author = {G. Ramalingam and C. Pandu Rangan}, title = {Total Domination in Interval Graphs Revisited}, journal = {Inf. Process. Lett.}, volume = {27}, number = {1}, pages = {17--21}, year = {1988}, url = {https://doi.org/10.1016/0020-0190(88)90076-2}, doi = {10.1016/0020-0190(88)90076-2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/RamalingamR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/RamalingamR88a, author = {G. Ramalingam and C. Pandu Rangan}, title = {A Unified Approach to Domination Problems on Interval Graphs}, journal = {Inf. Process. Lett.}, volume = {27}, number = {5}, pages = {271--274}, year = {1988}, url = {https://doi.org/10.1016/0020-0190(88)90091-9}, doi = {10.1016/0020-0190(88)90091-9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/RamalingamR88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/KrishnanRS88, author = {S. V. Krishnan and C. Pandu Rangan and S. Seshadri}, editor = {Kesav V. Nori and Sanjeev Kumar}, title = {A New Linear Algorithm for the Two Path Problem on Chordal Graphs}, booktitle = {Foundations of Software Technology and Theoretical Computer Science, Eighth Conference, Pune, India, December 21-23, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {338}, pages = {49--66}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-50517-2\_70}, doi = {10.1007/3-540-50517-2\_70}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/KrishnanRS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acta/KumarR87, author = {S. Kiran Kumar and C. Pandu Rangan}, title = {A Linear Space Algorithm for the {LCS} Problem}, journal = {Acta Informatica}, volume = {24}, number = {3}, pages = {353--362}, year = {1987}, url = {https://doi.org/10.1007/BF00265993}, doi = {10.1007/BF00265993}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acta/KumarR87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/PrasadP87, author = {T. Hari Krishna Prasad and C. Pandurangan}, title = {New Parallel Algorithms for the Maximum Empty Rectangle Problem}, booktitle = {International Conference on Parallel Processing, ICPP'87, University Park, PA, USA, August 1987}, pages = {286--288}, publisher = {Pennsylvania State University Press}, year = {1987}, timestamp = {Mon, 28 Jul 2014 17:06:01 +0200}, biburl = {https://dblp.org/rec/conf/icpp/PrasadP87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wg/GovindanR87, author = {Ramesh Govindan and C. Pandu Rangan}, editor = {Herbert G{\"{o}}ttler and Hans J{\"{u}}rgen Schneider}, title = {Competitive Location in the L\({}_{\mbox{1}}\) and L\({}_{\mbox{INF}}\) Metrics}, booktitle = {Graph-Theoretic Concepts in Computer Science, International Workshop, {WG} '87, Kloster Banz/Staffelstein, Germany, June 29 - July 1, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {314}, pages = {70--83}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-19422-3\_6}, doi = {10.1007/3-540-19422-3\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/wg/GovindanR87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wg/DewanganR86, author = {Ramesh Dewangan and C. Pandu Rangan}, editor = {Gottfried Tinhofer and Gunther Schmidt}, title = {A Simple Implementation of Warshall's Algorithm on a {VLSI} Chip}, booktitle = {Graphtheoretic Concepts in Computer Science, International Workshop, {WG} '86, Bernried, Germany, June 17-19, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {246}, pages = {131--145}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-17218-1\_55}, doi = {10.1007/3-540-17218-1\_55}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/wg/DewanganR86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/Rangan83, author = {C. Pandu Rangan}, title = {On the Minimum Number of Additions Required to Compute a Quadratic Form}, journal = {J. Algorithms}, volume = {4}, number = {3}, pages = {282--285}, year = {1983}, url = {https://doi.org/10.1016/0196-6774(83)90027-5}, doi = {10.1016/0196-6774(83)90027-5}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/Rangan83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.