|
Search the dblp DataBase
Arvind Narayanan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim
Practical Pay TV Schemes. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:192-203 [Conf]
- Arvind Narayanan, Vitaly Shmatikov
Obfuscated databases and group privacy. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:102-111 [Conf]
- Arvind Narayanan, Vitaly Shmatikov
Fast dictionary attacks on passwords using time-space tradeoff. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:364-372 [Conf]
- K. Srinathan, Arvind Narayanan, C. Pandu Rangan
Optimal Perfectly Secure Message Transmission. [Citation Graph (0, 0)][DBLP] CRYPTO, 2004, pp:545-561 [Conf]
- V. Vinod, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim
On the Power of Computational Secret Sharing. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:162-176 [Conf]
- Arvind Narayanan, K. Srinathan, C. Pandu Rangan
Perfectly Reliable Message Transmission. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2006, v:100, n:1, pp:23-28 [Journal]
- Arvind Narayanan, Vitaly Shmatikov
How To Break Anonymity of the Netflix Prize Dataset [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
Robust De-anonymization of Large Sparse Datasets. [Citation Graph (, )][DBLP]
De-anonymizing Social Networks. [Citation Graph (, )][DBLP]
Myths and fallacies of "personally identifiable information". [Citation Graph (, )][DBLP]
De-anonymizing Social Networks [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|