default search action
Manoj Mishra
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Mohit Sharma, Sandeep Kumar Kajala, Manoj Mishra, Brajraj Singh, Soumendu Jana:
A novel algorithm to determine the input energy for soliton generation in a media with a patterned property. Commun. Nonlinear Sci. Numer. Simul. 126: 107513 (2023) - [j3]Suneel Kumar, Manoj Kumar Singh, Manoj Mishra:
Efficient Deep Feature Based Semantic Image Retrieval. Neural Process. Lett. 55(3): 2225-2248 (2023) - 2021
- [c14]Manideep Mamindlapally, Anuj Kumar Yadav, Manoj Mishra, Amitalok J. Budkuley:
Commitment Capacity under Cost Constraints. ISIT 2021: 3208-3213 - [i10]Rosly Boy Lyngdoh, Anand S. Sahadevan, Touseef Ahmad, Pradyuman Singh Rathore, Manoj Mishra, Praveen Kumar Gupta, Arundhati Misra:
AVHYAS: A Free and Open Source QGIS Plugin for Advanced Hyperspectral Image Analysis. CoRR abs/2106.12776 (2021) - 2020
- [j2]Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz:
The Communication Complexity of Private Simultaneous Messages, Revisited. J. Cryptol. 33(3): 917-953 (2020) - [c13]Varun Narayanan, Manoj Mishra, Vinod M. Prabhakaran:
Private Two-Terminal Hypothesis Testing. ISIT 2020: 1001-1006 - [i9]Varun Narayanan, Manoj Mishra, Vinod M. Prabhakaran:
Private Two-Terminal Hypothesis Testing. CoRR abs/2005.05961 (2020)
2010 – 2019
- 2018
- [c12]Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz:
The Communication Complexity of Private Simultaneous Messages, Revisited. EUROCRYPT (2) 2018: 261-286 - [i8]Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz:
The Communication Complexity of Private Simultaneous Messages, Revisited. Electron. Colloquium Comput. Complex. TR18 (2018) - [i7]Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz:
The Communication Complexity of Private Simultaneous Messages, Revisited. IACR Cryptol. ePrint Arch. 2018: 144 (2018) - 2017
- [j1]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
Wiretapped Oblivious Transfer. IEEE Trans. Inf. Theory 63(4): 2560-2595 (2017) - 2016
- [c11]Shashank Arora, Gaurav Varshney, Pradeep K. Atrey, Manoj Mishra:
SecureCEdit: An approach for secure cloud-based document editing. CNS 2016: 561-564 - [i6]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
Wiretapped Oblivious Transfer. CoRR abs/1604.05668 (2016) - 2015
- [c10]Piyush Madan, Jaismeen Kaur, Sheetal Bhavsar, Dhaval Patel, Manoj Mishra:
GPU-based out-of-core MDL clustering algorithm. CODS 2015: 124-125 - [c9]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
On the oblivious transfer capacity of the degraded wiretapped binary erasure channel. ISIT 2015: 1169-1173 - [c8]Manoj Mishra, Tanmay Sharma, Bikash Kumar Dey, Vinod M. Prabhakaran:
Private data transfer over a broadcast channel. ISIT 2015: 1352-1356 - [i5]Manoj Mishra, Tanmay Sharma, Bikash Kumar Dey, Vinod M. Prabhakaran:
Private Data Transfer over a Broadcast Channel. CoRR abs/1504.01101 (2015) - [i4]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
On the Oblivious Transfer Capacity of the Degraded Wiretapped Binary Erasure Channel. CoRR abs/1504.04499 (2015) - 2014
- [c7]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
The oblivious transfer capacity of the wiretapped binary erasure channel. ISIT 2014: 1539-1543 - [c6]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
On the oblivious transfer capacity region of the binary erasure broadcast channel. ITW 2014: 237-241 - [c5]Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran:
How to securely compute the modulo-two sum of binary sources. ITW 2014: 496-500 - [i3]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel. CoRR abs/1404.6614 (2014) - [i2]Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran:
How to Securely Compute the Modulo-Two Sum of Binary Sources. CoRR abs/1405.2555 (2014) - 2012
- [c4]V. Santhosh Kumar Tangudu, Manoj Mishra:
Estimating makespan using double trust thresholds for workflow applications. CUBE 2012: 532-536 - [c3]P. L. V. Vihari, Manoj Mishra:
Chaotic image encryption on GPU. CUBE 2012: 753-758 - 2011
- [c2]Jambhlekar Pushkar Arun, Manoj Mishra, Sheshasayee V. Subramaniam:
Parallel implementation of MOPSO on GPU using OpenCL and CUDA. HiPC 2011: 1-10 - [i1]Ruchita Goyal, Divyanshu, Manoj Mishra:
Quality of Service Provisioning in Manet Using a Cross-Layer Approach for Routing. CoRR abs/1105.5593 (2011)
2000 – 2009
- 2008
- [c1]Rajeev Singh, Suman Das, Durga Toshniwal, Manoj Mishra, Ramesh C. Joshi:
E-CAP: An Extended Capability Based Mechanism to Limit Distributed Denial of Service Attacks. ICETET 2008: 1244-1249
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint