Kannan Srinathan

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability2022-12-07Paper
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission
IEEE Transactions on Information Theory
2018-06-27Paper
Secret sharing for mNP: completeness results
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Retrieving and routing quantum information in a quantum network
Quantum Information Processing
2016-04-01Paper
Possibility and complexity of probabilistic reliable communication in directed networks
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
2015-03-10Paper
Reporting and counting maximal points in a query orthogonal rectangle
Journal of Discrete Algorithms
2015-02-13Paper
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
2014-12-12Paper
Efficient single phase unconditionally secure message transmission with optimum communication complexity
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
2014-12-12Paper
On perfectly secure communication over arbitrary networks
Proceedings of the twenty-first annual symposium on Principles of distributed computing
2014-07-25Paper
On reporting the \(L_1\) metric closest pair in a query rectangle
Information Processing Letters
2014-04-15Paper
On Generalized Planar Skyline and Convex Hull Range Queries
Algorithms and Computation
2014-02-18Paper
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission
Journal of the ACM
2014-02-17Paper
Interplay between (im)perfectness, synchrony and connectivity: the case of reliable message transmission
Theoretical Computer Science
2014-01-10Paper
Counting Maximal Points in a Query Orthogonal Rectangle
WALCOM: Algorithms and Computation
2013-04-12Paper
Range aggregate maximal points in the plane
WALCOM: Algorithms and Computation
2012-06-08Paper
Data structures for extension violations in a query range
JMMA. Journal of Mathematical Modelling and Algorithms
2012-02-21Paper
Secure Message Transmission in Asynchronous Directed Graphs
Lecture Notes in Computer Science
2011-12-16Paper
Byzantine Agreement Using Partial Authentication
Lecture Notes in Computer Science
2011-10-28Paper
Secure message transmission in asynchronous networks
Journal of Parallel and Distributed Computing
2011-08-19Paper
DMIPS -- defensive mechanism against IP spoofing
Information Security and Privacy
2011-07-07Paper
Minimal connectivity for unconditionally secure message transmission in synchronous directed networks
Lecture Notes in Computer Science
2011-05-19Paper
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality
International Journal of Applied Cryptography
2011-04-05Paper
Range-Aggregate Queries Involving Geometric Aggregation Operations
WALCOM: Algorithms and Computation
2011-02-20Paper
scientific article; zbMATH DE number 5764833 (Why is no real title available?)2010-08-06Paper
Authenticated Byzantine generals in dual failure model
Distributed Computing and Networking
2010-02-16Paper
Perfectly reliable message transmission
Information Processing Letters
2010-01-29Paper
On exponential lower bound for protocols for reliable communication in networks
Lecture Notes in Computer Science
2009-12-03Paper
Perfectly reliable and secure message transmission tolerating mobile adversary
International Journal of Applied Cryptography
2009-05-12Paper
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks
Distributed Computing and Networking
2009-03-26Paper
On Proactive Perfectly Secure Message Transmission
Information Security and Privacy
2009-03-06Paper
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
Lecture Notes in Computer Science
2009-01-09Paper
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary
Lecture Notes in Computer Science
2008-09-02Paper
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Cryptology and Network Security
2008-04-15Paper
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality
Lecture Notes in Computer Science
2008-04-11Paper
Alternative Protocols for Generalized Oblivious Transfer
Distributed Computing and Networking
2008-03-06Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 2090007 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 1955808 (Why is no real title available?)2003-07-29Paper
scientific article; zbMATH DE number 1950364 (Why is no real title available?)2003-07-17Paper
Asynchronous Secure Communication Tolerating Mixed Adversaries
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1857530 (Why is no real title available?)2003-01-28Paper
scientific article; zbMATH DE number 1583939 (Why is no real title available?)2001-07-08Paper
scientific article; zbMATH DE number 1583940 (Why is no real title available?)2001-07-08Paper


Research outcomes over time


This page was built for person: Kannan Srinathan