Search results for: K. Srinathan
Lecture Notes in Computer Science > Progress in Cryptology —INDOCRYPT 2000 > Electronic Cash & Multiparty Computation > 117-129
Lecture Notes in Computer Science > Computing and Combinatorics > Combinatorial Optimization > 514-524
Lecture Notes in Computer Science > Information Theoretic Security > Private and Reliable Message Transmission > 89-98
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > Provable Security: Public Key Cryptography > 221-235
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2003 > Secrect Sharing > 162-176
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2004 > Computationally Unbounded Adversaries > 545-561
Lecture Notes in Computer Science > Security in Communication Networks > Information Theory and Secret Sharing > 342-353
Lecture Notes in Computer Science > Progress in Cryptology —INDOCRYPT 2000 > Electronic Cash & Multiparty Computation > 130-142
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2001 > Distributed Cryptography > 232-241
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2002 > Secret Sharing and Oblivious Transfer > 409-421
Lecture Notes in Computer Science > Information Security and Privacy > Dealing with Adversaries > 497-511
Lecture Notes in Computer Science > Information Theoretic Security > Secure and Reliable Communication II > 137-155
Quantum Information Processing > 2015 > 14 > 12 > 4651-4664
Journal of Clinical Epidemiology > 2014 > 67 > 6 > 622-628