Pandu

Results: 11



#Item
1

Cache me if you can: Capacitated Selfish Replication Games ? Ragavendran Gopalakrishnan1 , Dimitrios Kanoulas2 , Naga Naresh Karuturi3 , C. Pandu Rangan4 , Rajmohan Rajaraman2 , and Ravi Sundaram2 2

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2011-12-19 07:11:26
    2Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

    - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

    Add to Reading List

    Source URL: security-lab.jaist.ac.jp

    Language: English - Date: 2015-11-09 21:16:55
    3

    Asynchronous Secure Communication Tolerating Mixed Adversaries K. Srinathan1? , M. V. N. Ashwin Kumar2 , and C. Pandu Rangan1 ??

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2007-08-31 13:50:34
      4RSA / Ring signature / BLS / Schnorr signature / Strong RSA assumption / Model theory / Forking lemma / Group signature / Blind signature / Cryptography / Public-key cryptography / Digital signature

      Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2011-12-21 04:48:54
      5Digital signature / Key management / Notary / Cyberwarfare / Security / Cryptography / Public-key cryptography / Civil law

      Sanitizable signatures with strong transparency in the standard model Shivank Agrawal, Swarun Kumar, Amjed Shareef and C. Pandu Rangan Theoretical Computer Science Lab, Department of Computer Science and Engineering, Ind

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2010-04-02 02:07:27
      6Artificial neuron / Wire

      On the Power of Computational Se ret Sharing V. Vinod1 ? , Arvind Narayanan2, K. Srinathan2 ?? , and C. Pandu Rangan2 ? ? ? 1 Laboratory for Computer S ien e, Massa husetts Institute of Te hnology, Cambridge, MA 02139, U

      Add to Reading List

      Source URL: people.csail.mit.edu

      Language: English - Date: 2010-02-04 10:28:45
      7C programming language / International Obfuscated C Code Contest / Classical cipher

      Brief Announcement: Efficient Perfectly Secure Communication over Synchronous Networks K. Srinathan*t C. Pandu Rangan~*

      Add to Reading List

      Source URL: people.csail.mit.edu

      Language: English - Date: 2010-02-04 10:28:11
      8Secret sharing / Secure multi-party computation / Information / Cyberwarfare / Security / Polynomials / Orthogonal polynomials / Cryptographic protocols / Cryptography / Verifiable secret sharing

      Round-Optimal and Efficient Verifiable Secret Sharing Matthias Fitzi1? , Juan Garay2?? , Shyamnath Gollakota3? ? ? , C. Pandu Rangan3† , and Kannan Srinathan4 1

      Add to Reading List

      Source URL: people.csail.mit.edu

      Language: English - Date: 2007-04-05 18:50:42
      9

      Hisbul Wathan SEJARAH SINGKAT PANDU HIZBUL WATHAN

      Add to Reading List

      Source URL: www.smuha-yog.sch.id

      Language: Indonesian - Date: 2011-04-09 03:34:02
        10Kurukshetra / Satyavati / Ambika / Pandu / Vidura / Ambalika / Dhritarashtra / Parashara / Kuru Kingdom / Hindu mythology / Mahabharata / Hinduism

        PDF Document

        Add to Reading List

        Source URL: www.manushi-india.org

        Language: English - Date: 2007-04-05 10:25:51
        UPDATE