The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ashish Choudhary: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ashish Choudhary
    Accepting Hybrid Networks of Evolutionary Processors with Splicing Rules and Forbidding Context. [Citation Graph (0, 0)][DBLP]
    IICAI, 2005, pp:2686-2698 [Conf]
  2. Arpita Patra, Ashish Choudhary, K. Srinathan, C. Pandu Rangan
    Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:221-235 [Conf]
  3. Ashish Choudhary, Kamala Krithivasan
    Network of Evolutionary Processors with Splicing Rules. [Citation Graph (0, 0)][DBLP]
    IWINAC (1), 2005, pp:290-299 [Conf]
  4. Ashish Choudhary, Kamala Krithivasan
    Network of Evolutionary Processors with Splicing Rules and Forbidding Context. [Citation Graph (0, 0)][DBLP]
    IWINAC (1), 2005, pp:300-309 [Conf]
  5. Ashish Choudhary, Marcel Brun, Jianping Hua, James Lowey, Edward Suh, Edward R. Dougherty
    Genetic test bed for feature selection. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2006, v:22, n:7, pp:837-842 [Journal]
  6. Ashish Choudhary, Aniruddha Datta, Michael L. Bittner, Edward R. Dougherty
    Intervention in a family of Boolean networks. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2006, v:22, n:2, pp:226-232 [Journal]
  7. Aniruddha Datta, Ashish Choudhary, Michael L. Bittner, Edward R. Dougherty
    External control in Markovian genetic regulatory networks: the imperfect information case. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2004, v:20, n:6, pp:924-930 [Journal]
  8. Aniruddha Datta, Ashish Choudhary, Michael L. Bittner, Edward R. Dougherty
    External Control in Markovian Genetic Regulatory Networks. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 2003, v:52, n:1-2, pp:169-191 [Journal]
  9. Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan
    Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:80-101 [Conf]
  10. Arpita Patra, Ashish Choudhary, Chanrasekharan Pandu Rangan
    Constant phase efficient protocols for secure message transmission in directed networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:322-323 [Conf]
  11. Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan
    Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary. [Citation Graph (0, 0)][DBLP]
    DISC, 2007, pp:496-498 [Conf]

  12. Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary. [Citation Graph (, )][DBLP]


  13. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. [Citation Graph (, )][DBLP]


  14. Unconditionally Reliable Message Transmission in Directed Hypergraphs. [Citation Graph (, )][DBLP]


  15. Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. [Citation Graph (, )][DBLP]


  16. The Round Complexity of Verifiable Secret Sharing Revisited. [Citation Graph (, )][DBLP]


  17. Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. [Citation Graph (, )][DBLP]


  18. Round Efficient Unconditionally Secure Multiparty Computation Protocol. [Citation Graph (, )][DBLP]


  19. Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience. [Citation Graph (, )][DBLP]


  20. Efficient single phase unconditionally secure message transmission with optimum communication complexity. [Citation Graph (, )][DBLP]


  21. On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary. [Citation Graph (, )][DBLP]


  22. Brief announcement: perfectly secure message transmission in directed networks re-visited. [Citation Graph (, )][DBLP]


  23. Simple and efficient asynchronous byzantine agreement with optimal resilience. [Citation Graph (, )][DBLP]


  24. Information Theoretically Secure Multi Party Set Intersection Re-visited. [Citation Graph (, )][DBLP]


  25. Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited. [Citation Graph (, )][DBLP]


  26. On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks. [Citation Graph (, )][DBLP]


  27. On Communication Complexity of Secure Message Transmission in Directed Networks. [Citation Graph (, )][DBLP]


  28. Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience. [Citation Graph (, )][DBLP]


  29. Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary. [Citation Graph (, )][DBLP]


  30. Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.301secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002