


Остановите войну!
for scientists:


default search action
Vinod M. Prabhakaran
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j28]Varun Narayanan, Jithin Ravi
, Vivek K. Mishra, Bikash Kumar Dey
, Nikhil Karamchandani
, Vinod M. Prabhakaran
:
Private Index Coding. IEEE Trans. Inf. Theory 68(3): 2020-2049 (2022) - [j27]Gowtham R. Kurri
, Viswanathan Ramachandran
, Sibi Raj B. Pillai
, Vinod M. Prabhakaran
:
Multiple Access Channel Simulation. IEEE Trans. Inf. Theory 68(11): 7575-7603 (2022) - [c88]Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran
, Mohammad Ali Rehan
:
Secure Non-interactive Reduction and Spectral Analysis of Correlations. EUROCRYPT (3) 2022: 797-827 - [c87]Neha Sangwan, Varun Narayanan, Vinod M. Prabhakaran:
Byzantine Consensus Over Broadcast Channels. ISIT 2022: 1157-1162 - [i58]Neha Sangwan, Varun Narayanan, Vinod M. Prabhakaran:
Consensus Capacity of Noisy Broadcast Channels. CoRR abs/2205.06073 (2022) - [i57]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Byzantine Multiple Access Channels - Part I: Reliable Communication. CoRR abs/2211.12769 (2022) - [i56]Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan:
Secure Non-Interactive Reduction and Spectral Analysis of Correlations. IACR Cryptol. ePrint Arch. 2022: 262 (2022) - 2021
- [j26]Gowtham R. Kurri
, Vinod M. Prabhakaran
, Anand D. Sarwate
:
Coordination Through Shared Randomness. IEEE Trans. Inf. Theory 67(8): 4948-4974 (2021) - [j25]Aditya Narayan Ravi, Sibi Raj B. Pillai
, Vinod M. Prabhakaran
, Michèle A. Wigger
:
On the Capacity Enlargement of Gaussian Broadcast Channels With Passive Noisy Feedback. IEEE Trans. Inf. Theory 67(10): 6356-6367 (2021) - [j24]Yanjun Han
, Kedar Tatwawadi
, Gowtham R. Kurri
, Zhengqing Zhou
, Vinod M. Prabhakaran
, Tsachy Weissman:
Optimal Communication Rates and Combinatorial Properties for Common Randomness Generation. IEEE Trans. Inf. Theory 67(12): 7723-7739 (2021) - [c86]Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran, Alon Rosen:
Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration. CRYPTO (2) 2021: 124-154 - [c85]Syomantak Chaudhuri, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Compound Arbitrarily Varying Channels. ISIT 2021: 503-508 - [c84]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Communication With Adversary Identification in Byzantine Multiple Access Channels. ISIT 2021: 688-693 - [c83]Yanjun Han, Kedar Tatwawadi, Gowtham R. Kurri, Zhengqing Zhou, Vinod M. Prabhakaran, Tsachy Weissman:
Optimal Communication Rates and Combinatorial Properties for Common Randomness Generation. ISIT 2021: 1931-1936 - [c82]Gowtham R. Kurri, Viswanathan Ramachandran
, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
Multiple Access Channel Simulation. ISIT 2021: 2411-2416 - [c81]Aditya Narayan Ravi, Sibi Raj B. Pillai, Vinod M. Prabhakaran, Michèle A. Wigger:
On the Capacity Region of Gaussian Broadcast Channels under Two-Sided Noisy Feedback. ISIT 2021: 2870-2875 - [c80]Eeshan Modak, Himanshu Asnani, Vinod M. Prabhakaran:
Rényi Divergence Based Bounds on Generalization Error. ITW 2021: 1-6 - [i55]Gowtham R. Kurri, Viswanathan Ramachandran
, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
Multiple Access Channel Simulation. CoRR abs/2102.12035 (2021) - [i54]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Communication With Adversary Identification in Byzantine Multiple Access Channels. CoRR abs/2105.03380 (2021) - [i53]Syomantak Chaudhuri, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Compound Arbitrarily Varying Channels. CoRR abs/2105.03420 (2021) - 2020
- [j23]Deepesh Data
, Gowtham R. Kurri
, Jithin Ravi
, Vinod M. Prabhakaran
:
Interactive Secure Function Computation. IEEE Trans. Inf. Theory 66(9): 5492-5521 (2020) - [c79]Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran, Alon Rosen:
Cryptography from One-Way Communication: On Completeness of Finite Channels. ASIACRYPT (3) 2020: 653-685 - [c78]Gowtham R. Kurri, Vinod M. Prabhakaran:
Secure Computation to Hide Functions of Inputs. ISIT 2020: 972-977 - [c77]Varun Narayanan, Manoj Mishra, Vinod M. Prabhakaran:
Private Two-Terminal Hypothesis Testing. ISIT 2020: 1001-1006 - [c76]Aditya Narayan Ravi, Sibi Raj B. Pillai, Vinod M. Prabhakaran, Michèle A. Wigger:
When does Partial Noisy Feedback Enlarge the Capacity of a Gaussian Broadcast Channel? ISIT 2020: 1480-1485 - [c75]Viswanathan Ramachandran
, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
Strong Coordination with Side Information. ISIT 2020: 1564-1569 - [c74]Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran:
Zero-Communication Reductions. TCC (3) 2020: 274-304 - [i52]Gowtham R. Kurri, Vinod M. Prabhakaran:
Secure Computation to Hide Functions of Inputs. CoRR abs/2005.05111 (2020) - [i51]Varun Narayanan, Manoj Mishra, Vinod M. Prabhakaran:
Private Two-Terminal Hypothesis Testing. CoRR abs/2005.05961 (2020) - [i50]Varun Narayanan, Jithin Ravi, Vivek K. Mishra, Bikash Kumar Dey, Nikhil Karamchandani, Vinod M. Prabhakaran:
Private Index Coding. CoRR abs/2006.00257 (2020) - [i49]Aditya Narayan Ravi, Sibi Raj B. Pillai, Vinod M. Prabhakaran, Michèle A. Wigger:
On the Capacity Enlargement of Gaussian Broadcast Channels with Passive Noisy Feedback. CoRR abs/2009.08765 (2020) - [i48]Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran:
Zero-Communication Reductions. IACR Cryptol. ePrint Arch. 2020: 1341 (2020)
2010 – 2019
- 2019
- [j22]Viswanathan Ramachandran
, Sibi Raj B. Pillai
, Vinod M. Prabhakaran
:
Joint State Estimation and Communication Over a State-Dependent Gaussian Multiple Access Channel. IEEE Trans. Commun. 67(10): 6743-6752 (2019) - [c73]Sibi Raj B. Pillai, Manoj Prabhakaran, Vinod M. Prabhakaran
, Srivatsan Sridhar
:
Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation. INDOCRYPT 2019: 216-226 - [c72]Viswanathan Ramachandran
, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
Message and State Communication over Channels with Action Dependent States. ISIT 2019: 280-284 - [c71]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Multiple Access Channels with Adversarial Users. ISIT 2019: 435-439 - [c70]Gowtham R. Kurri, Vinod M. Prabhakaran:
Coordination via Shared Randomness. ITW 2019: 1-5 - [c69]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Multiple Access Channels with Byzantine Users. ITW 2019: 1-5 - [c68]Viswanathan Ramachandran
, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
Channels with Action Dependent States and Common Reconstructions. NCC 2019: 1-6 - [i47]Yanjun Han, Kedar Tatwawadi, Zhengqing Zhou, Gowtham R. Kurri, Vinod M. Prabhakaran, Tsachy Weissman:
Optimal Communication Rates for Zero-Error Distributed Simulation under Blackboard Communication Protocols. CoRR abs/1904.03271 (2019) - [i46]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Byzantine Multiple Access. CoRR abs/1904.11925 (2019) - [i45]Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate:
Coordination Through Shared Randomness. CoRR abs/1908.08407 (2019) - 2018
- [j21]Vaishakh Ravindrakumar, Parthasarathi Panda, Nikhil Karamchandani
, Vinod M. Prabhakaran:
Private Coded Caching. IEEE Trans. Inf. Forensics Secur. 13(3): 685-694 (2018) - [j20]Mayank Bakshi
, Vinod M. Prabhakaran
:
Plausible Deniability Over Broadcast Channels. IEEE Trans. Inf. Theory 64(12): 7883-7902 (2018) - [c67]Gowtham R. Kurri, Vinod M. Prabhakaran, Jithin Ravi
:
The Role of Interaction and Common Randomness in Two-User Secure Computation. ISIT 2018: 591-595 - [c66]Varun Narayanan, Vinod M. Prabhakaran, Jithin Ravi
, Vivek K. Mishra, Bikash Kumar Dey, Nikhil Karamchandani:
Private Index Coding. ISIT 2018: 596-600 - [c65]Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate
:
Coordination Using Individually Shared Randomness. ISIT 2018: 2550-2554 - [c64]Viswanathan Ramachandran
, Meghna Sreenivasan, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
State-Dependent Gaussian Broadcast Channel with Common State Reconstructions. ISITA 2018: 658-662 - [c63]Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran:
On the Rate Distortion Function of Arbitrarily Varying Remote Sources. ITW 2018: 1-5 - [c62]Viswanathan Ramachandran
, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
Degraded Relay Channel with Non-causal State Information at the Source and Relay. SPCOM 2018: 442-446 - [c61]Varun Narayanan, Vinod M. Prabhakaran:
Oblivious Transfer in Incomplete Networks. TCC (1) 2018: 389-418 - [i44]Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate:
Coordination Using Individually Shared Randomness. CoRR abs/1805.03193 (2018) - [i43]Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran:
Arbitrarily Varying Remote Sources. CoRR abs/1809.04464 (2018) - [i42]Viswanathan Ramachandran, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
Joint State Estimation and Communication over a State-Dependent Gaussian Multiple Access Channel. CoRR abs/1811.09973 (2018) - [i41]Deepesh Data, Gowtham R. Kurri, Jithin Ravi, Vinod M. Prabhakaran:
Interactive Secure Function Computation. CoRR abs/1812.03838 (2018) - [i40]Varun Narayanan, Vinod M. Prabhakaran:
Oblivious Transfer in Incomplete Networks. IACR Cryptol. ePrint Arch. 2018: 875 (2018) - 2017
- [j19]Manoj Mishra
, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
Wiretapped Oblivious Transfer. IEEE Trans. Inf. Theory 63(4): 2560-2595 (2017) - [j18]Amitalok J. Budkuley
, Bikash Kumar Dey, Vinod M. Prabhakaran:
Communication in the Presence of a State-Aware Adversary. IEEE Trans. Inf. Theory 63(11): 7396-7419 (2017) - [c60]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Coding for arbitrarily varying remote sources. ISIT 2017: 729-733 - [c59]Deepesh Data, Vinod M. Prabhakaran:
Secure computation of randomized functions: Further results. ITW 2017: 264-268 - [i39]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Coding for Arbitrarily Varying Remote Sources. CoRR abs/1704.07693 (2017) - [i38]Deepesh Data, Vinod M. Prabhakaran:
Secure Computation of Randomized Functions: Further Results. CoRR abs/1705.07081 (2017) - 2016
- [j17]László Czap, Vinod M. Prabhakaran, Christina Fragouli, Suhas N. Diggavi:
An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback. IEEE Trans. Inf. Theory 62(5): 2430-2480 (2016) - [j16]Deepesh Data, Vinod M. Prabhakaran
, Manoj M. Prabhakaran:
Communication and Randomness Lower Bounds for Secure Computation. IEEE Trans. Inf. Theory 62(7): 3901-3929 (2016) - [j15]Shirin Saeedi Bidokhti
, Vinod M. Prabhakaran, Suhas N. Diggavi:
Capacity Results for Multicasting Nested Message Sets Over Combination Networks. IEEE Trans. Inf. Theory 62(9): 4968-4992 (2016) - [c58]Manoj M. Prabhakaran, Vinod M. Prabhakaran:
Rényi Information Complexity and an Information Theoretic Characterization of the Partition Bound. ICALP 2016: 88:1-88:14 - [c57]Vaishakh Ravindrakumar, Parthasarathi Panda, Nikhil Karamchandani, Vinod M. Prabhakaran:
Fundamental limits of secretive coded caching. ISIT 2016: 425-429 - [c56]Sundara Rajan S, Shijin Rajakrishnan, Andrew Thangaraj, Vinod M. Prabhakaran:
Lower bounds and optimal protocols for three-party secure computation. ISIT 2016: 1361-1365 - [c55]Mayank Bakshi
, Vinod M. Prabhakaran:
Plausible deniability over broadcast channels. ISIT 2016: 2219-2223 - [i37]Mayank Bakshi, Vinod M. Prabhakaran:
Plausible Deniability over Broadcast Channels. CoRR abs/1601.06676 (2016) - [i36]Shijin Rajakrishnan, Sundara Rajan S, Vinod M. Prabhakaran:
Lower Bounds for Interactive Function Computation via Wyner Common Information. CoRR abs/1602.02390 (2016) - [i35]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
Wiretapped Oblivious Transfer. CoRR abs/1604.05668 (2016) - [i34]Vaishakh Ravindrakumar, Parthasarathi Panda, Nikhil Karamchandani, Vinod M. Prabhakaran:
Fundamental Limits of Secretive Coded Caching. CoRR abs/1605.01348 (2016) - 2015
- [j14]Christina Fragouli, Vinod M. Prabhakaran, László Czap, Suhas N. Diggavi:
Wireless Network Security: Building on Erasures. Proc. IEEE 103(10): 1826-1840 (2015) - [j13]László Czap, Christina Fragouli, Vinod M. Prabhakaran, Suhas N. Diggavi:
Secure Network Coding With Erasures and Feedback. IEEE Trans. Inf. Theory 61(4): 1667-1686 (2015) - [j12]László Czap, Vinod M. Prabhakaran, Christina Fragouli, Suhas N. Diggavi:
Secret Communication Over Broadcast Erasure Channels With State-Feedback. IEEE Trans. Inf. Theory 61(9): 4788-4808 (2015) - [c54]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
On the oblivious transfer capacity of the degraded wiretapped binary erasure channel. ISIT 2015: 1169-1173 - [c53]Manoj Mishra, Tanmay Sharma, Bikash Kumar Dey, Vinod M. Prabhakaran:
Private data transfer over a broadcast channel. ISIT 2015: 1352-1356 - [c52]Deepesh Data, Vinod M. Prabhakaran:
On coding for secure computing. ISIT 2015: 2737-2741 - [c51]Sibi Raj B. Pillai, Vinod M. Prabhakaran:
On the noisy feedback capacity of Gaussian broadcast channels. ITW 2015: 1-5 - [c50]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Dirty paper arbitrarily varying channel with a state-aware adversary. ITW Fall 2015: 94-98 - [c49]Ajaykrishnan N., Navya S. Prem, Vinod M. Prabhakaran, Rahul Vaze:
Critical database size for effective caching. NCC 2015: 1-6 - [i33]Ajaykrishnan N., Navya S. Prem, Vinod M. Prabhakaran, Rahul Vaze:
Critical Database Size for Effective Caching. CoRR abs/1501.02549 (2015) - [i32]Sibi Raj B. Pillai, Vinod M. Prabhakaran:
On the Noisy Feedback Capacity of Gaussian Broadcast Channels. CoRR abs/1502.04806 (2015) - [i31]Manoj Mishra, Tanmay Sharma, Bikash Kumar Dey, Vinod M. Prabhakaran:
Private Data Transfer over a Broadcast Channel. CoRR abs/1504.01101 (2015) - [i30]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Dirty Paper Arbitrarily Varying Channel with a State-Aware Adversary. CoRR abs/1504.04351 (2015) - [i29]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
On the Oblivious Transfer Capacity of the Degraded Wiretapped Binary Erasure Channel. CoRR abs/1504.04499 (2015) - [i28]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Communication in the Presence of a State-Aware Adversary. CoRR abs/1509.08299 (2015) - [i27]Manoj M. Prabhakaran, Vinod M. Prabhakaran:
Rényi Information Complexity and an Information Theoretic Characterization of the Partition Bound. CoRR abs/1511.07949 (2015) - [i26]Deepesh Data, Vinod M. Prabhakaran, Manoj M. Prabhakaran:
Communication and Randomness Lower Bounds for Secure Computation. CoRR abs/1512.07735 (2015) - [i25]Deepesh Data, Manoj Prabhakaran, Vinod M. Prabhakaran:
On the Communication Complexity of Secure Computation. IACR Cryptol. ePrint Arch. 2015: 391 (2015) - 2014
- [j11]Rui Wu, Vinod M. Prabhakaran, Pramod Viswanath, Yi Wang:
Interference Channels With Half-Duplex Source Cooperation. IEEE Trans. Inf. Theory 60(3): 1753-1781 (2014) - [j10]Shirin Saeedi Bidokhti, Vinod M. Prabhakaran:
Is Non-Unique Decoding Necessary? IEEE Trans. Inf. Theory 60(5): 2594-2610 (2014) - [j9]Vinod M. Prabhakaran, Manoj Prabhakaran:
Assisted Common Information With an Application to Secure Two-Party Sampling. IEEE Trans. Inf. Theory 60(6): 3413-3434 (2014) - [c48]Amitalok J. Budkuley, Bikash Kumar Dey, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
The Gaussian CEO competitive pricing game. COMSNETS 2014: 1-8 - [c47]Deepesh Data, Manoj Prabhakaran, Vinod M. Prabhakaran:
On the Communication Complexity of Secure Computation. CRYPTO (2) 2014: 199-216 - [c46]László Czap, Vinod M. Prabhakaran, Suhas N. Diggavi, Christina Fragouli:
Triangle network secrecy. ISIT 2014: 781-785 - [c45]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
The oblivious transfer capacity of the wiretapped binary erasure channel. ISIT 2014: 1539-1543 - [c44]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Writing on a dirty paper in the presence of jamming. ISIT 2014: 2242-2246 - [c43]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Correlated jamming in a Joint Source Channel Communication system. ISIT 2014: 2247-2251 - [c42]K. Sankeerth Rao
, Vinod M. Prabhakaran:
A new upperbound for the oblivious transfer capacity of discrete memoryless channels. ITW 2014: 35-39 - [c41]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
On the oblivious transfer capacity region of the binary erasure broadcast channel. ITW 2014: 237-241 - [c40]Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran:
How to securely compute the modulo-two sum of binary sources. ITW 2014: 496-500 - [i24]Rui Wu, Vinod M. Prabhakaran, Pramod Viswanath, Yi Wang:
Interference Channels with Half-Duplex Source Cooperation. CoRR abs/1402.0898 (2014) - [i23]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Correlated Jamming in a Joint Source Channel Communication System. CoRR abs/1404.5055 (2014) - [i22]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Writing on a Dirty Paper in the presence of Jamming. CoRR abs/1404.5060 (2014) - [i21]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel. CoRR abs/1404.6614 (2014) - [i20]K. Sankeerth Rao, Vinod M. Prabhakaran:
A New Upperbound for the Oblivious Transfer Capacity of Discrete Memoryless Channels. CoRR abs/1405.2049 (2014) - [i19]Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran:
How to Securely Compute the Modulo-Two Sum of Binary Sources. CoRR abs/1405.2555 (2014) - [i18]László Czap, Vinod M. Prabhakaran, Christina Fragouli, Suhas N. Diggavi:
Secret Communication over Broadcast Erasure Channels with State-feedback. CoRR abs/1408.1800 (2014) - [i17]Manoj Prabhakaran, Vinod M. Prabhakaran:
Tension Bounds for Information Complexity. CoRR abs/1408.6285 (2014) - [i16]Shirin Saeedi Bidokhti, Vinod M. Prabhakaran, Suhas N. Diggavi:
Capacity Results for Multicasting Nested Message Sets over Combination Networks. CoRR abs/1411.2417 (2014) - 2013
- [c39]Deepesh Data, Vinod M. Prabhakaran:
Communication requirements for secure computation. Allerton 2013: 211-217 - [c38]László Czap, Christina Fragouli, Vinod M. Prabhakaran, Suhas N. Diggavi:
Secure network coding with erasures and feedback. Allerton 2013: 1517-1524 - [c37]Animesh Kumar, Vinod M. Prabhakaran:
Estimation of bandlimited signals from the signs of noisy samples. ICASSP 2013: 5815-5819 - [c36]Shaunak Mishra, Christina Fragouli, Vinod M. Prabhakaran, Suhas N. Diggavi:
Using feedback for secrecy over graphs. ISIT 2013: 2399-2403 - [c35]Shirin Saeedi Bidokhti, Vinod M. Prabhakaran, Suhas N. Diggavi:
A block Markov encoding scheme for broadcasting nested message sets. ISIT 2013: 2975-2979 - [c34]Vinod M. Prabhakaran, Anand D. Sarwate
:
Assisted sampling of correlated sources. ISIT 2013: 3155-3159 - [c33]László Czap, Vinod M. Prabhakaran, Suhas N. Diggavi, Christina Fragouli:
Exploiting common randomness: A resource for network secrecy. ITW 2013: 1-5 - [c32]László Czap, Vinod M. Prabhakaran, Suhas N. Diggavi, Christina Fragouli:
Securing broadcast against dishonest receivers. NetCod 2013: 1-6 - [i15]Shaunak Mishra, Christina Fragouli, Vinod M. Prabhakaran, Suhas N. Diggavi:
Using Feedback for Secrecy over Graphs. CoRR abs/1305.3051 (2013) - [i14]