The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kannan Srinathan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kannan Srinathan, C. Pandu Rangan
    Possibility and complexity of probabilistic reliable communication in directed networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2006, pp:265-274 [Conf]
  2. Kannan Srinathan, N. R. Prasad, C. Pandu Rangan
    On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:311-320 [Conf]
  3. Kannan Srinathan, Prasad Raghavendra, C. Pandu Rangan
    On Proactive Perfectly Secure Message Transmission. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:461-473 [Conf]
  4. Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan
    Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary. [Citation Graph (0, 0)][DBLP]
    DISC, 2007, pp:496-498 [Conf]

  5. Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles. [Citation Graph (, )][DBLP]


  6. Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots. [Citation Graph (, )][DBLP]


  7. Generalized Robust Combiners for Oblivious Transfer. [Citation Graph (, )][DBLP]


  8. On Privacy Preserving Convex Hull. [Citation Graph (, )][DBLP]


  9. On reduced time fault tolerant paths for multiple UAVs covering a hostile terrain. [Citation Graph (, )][DBLP]


  10. On fast exploration in 2D and 3D terrains with multiple robots. [Citation Graph (, )][DBLP]


  11. Unconditionally Reliable Message Transmission in Directed Hypergraphs. [Citation Graph (, )][DBLP]


  12. Data Structures for Reporting Extension Violations in a Query Range. [Citation Graph (, )][DBLP]


  13. Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. [Citation Graph (, )][DBLP]


  14. PhotoSense: emergent semantics based approach to image annotation. [Citation Graph (, )][DBLP]


  15. Private Content Based Image Retrieval. [Citation Graph (, )][DBLP]


  16. Automatic keyphrase extraction from scientific documents using N-gram filtration technique. [Citation Graph (, )][DBLP]


  17. A performance prediction model for the CUDA GPGPU platform. [Citation Graph (, )][DBLP]


  18. Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  19. A novel video encryption technique based on secret sharing. [Citation Graph (, )][DBLP]


  20. Let Only the Right One IN: Privacy Management Scheme for Social Network. [Citation Graph (, )][DBLP]


  21. Fast and Secure Real-Time Video Encryption. [Citation Graph (, )][DBLP]


  22. Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. [Citation Graph (, )][DBLP]


  23. Privacy Preserving Computation of Shortest Path in Presence of a Single Convex Polygonal Obstacle. [Citation Graph (, )][DBLP]


  24. Efficient single phase unconditionally secure message transmission with optimum communication complexity. [Citation Graph (, )][DBLP]


  25. On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary. [Citation Graph (, )][DBLP]


  26. Brief announcement: global consistency can be easier than point-to-point communication. [Citation Graph (, )][DBLP]


  27. Unconditionally reliable message transmission in directed networks. [Citation Graph (, )][DBLP]


  28. Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT. [Citation Graph (, )][DBLP]


  29. Alternative Protocols for Generalized Oblivious Transfer. [Citation Graph (, )][DBLP]


  30. On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks. [Citation Graph (, )][DBLP]


  31. Authenticated Byzantine Generals in Dual Failure Model. [Citation Graph (, )][DBLP]


  32. On Composability of Reliable Unicast and Broadcast. [Citation Graph (, )][DBLP]


  33. Efficient Privacy Preserving K-Means Clustering. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002