| Publication | Date of Publication | Type |
|---|
| ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability | 2022-12-07 | Paper |
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission IEEE Transactions on Information Theory | 2018-06-27 | Paper |
Secret sharing for mNP: completeness results Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Retrieving and routing quantum information in a quantum network Quantum Information Processing | 2016-04-01 | Paper |
Possibility and complexity of probabilistic reliable communication in directed networks Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing | 2015-03-10 | Paper |
Reporting and counting maximal points in a query orthogonal rectangle Journal of Discrete Algorithms | 2015-02-13 | Paper |
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing | 2014-12-12 | Paper |
Efficient single phase unconditionally secure message transmission with optimum communication complexity Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing | 2014-12-12 | Paper |
On perfectly secure communication over arbitrary networks Proceedings of the twenty-first annual symposium on Principles of distributed computing | 2014-07-25 | Paper |
On reporting the \(L_1\) metric closest pair in a query rectangle Information Processing Letters | 2014-04-15 | Paper |
On Generalized Planar Skyline and Convex Hull Range Queries Algorithms and Computation | 2014-02-18 | Paper |
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission Journal of the ACM | 2014-02-17 | Paper |
Interplay between (im)perfectness, synchrony and connectivity: the case of reliable message transmission Theoretical Computer Science | 2014-01-10 | Paper |
Counting Maximal Points in a Query Orthogonal Rectangle WALCOM: Algorithms and Computation | 2013-04-12 | Paper |
Range aggregate maximal points in the plane WALCOM: Algorithms and Computation | 2012-06-08 | Paper |
Data structures for extension violations in a query range JMMA. Journal of Mathematical Modelling and Algorithms | 2012-02-21 | Paper |
Secure Message Transmission in Asynchronous Directed Graphs Lecture Notes in Computer Science | 2011-12-16 | Paper |
Byzantine Agreement Using Partial Authentication Lecture Notes in Computer Science | 2011-10-28 | Paper |
Secure message transmission in asynchronous networks Journal of Parallel and Distributed Computing | 2011-08-19 | Paper |
DMIPS -- defensive mechanism against IP spoofing Information Security and Privacy | 2011-07-07 | Paper |
Minimal connectivity for unconditionally secure message transmission in synchronous directed networks Lecture Notes in Computer Science | 2011-05-19 | Paper |
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality International Journal of Applied Cryptography | 2011-04-05 | Paper |
Range-Aggregate Queries Involving Geometric Aggregation Operations WALCOM: Algorithms and Computation | 2011-02-20 | Paper |
| scientific article; zbMATH DE number 5764833 (Why is no real title available?) | 2010-08-06 | Paper |
Authenticated Byzantine generals in dual failure model Distributed Computing and Networking | 2010-02-16 | Paper |
Perfectly reliable message transmission Information Processing Letters | 2010-01-29 | Paper |
On exponential lower bound for protocols for reliable communication in networks Lecture Notes in Computer Science | 2009-12-03 | Paper |
Perfectly reliable and secure message transmission tolerating mobile adversary International Journal of Applied Cryptography | 2009-05-12 | Paper |
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks Distributed Computing and Networking | 2009-03-26 | Paper |
On Proactive Perfectly Secure Message Transmission Information Security and Privacy | 2009-03-06 | Paper |
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary Lecture Notes in Computer Science | 2009-01-09 | Paper |
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary Lecture Notes in Computer Science | 2008-09-02 | Paper |
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary Cryptology and Network Security | 2008-04-15 | Paper |
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality Lecture Notes in Computer Science | 2008-04-11 | Paper |
Alternative Protocols for Generalized Oblivious Transfer Distributed Computing and Networking | 2008-03-06 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2007-02-12 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
| scientific article; zbMATH DE number 2090007 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 1955808 (Why is no real title available?) | 2003-07-29 | Paper |
| scientific article; zbMATH DE number 1950364 (Why is no real title available?) | 2003-07-17 | Paper |
Asynchronous Secure Communication Tolerating Mixed Adversaries Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1857530 (Why is no real title available?) | 2003-01-28 | Paper |
| scientific article; zbMATH DE number 1583939 (Why is no real title available?) | 2001-07-08 | Paper |
| scientific article; zbMATH DE number 1583940 (Why is no real title available?) | 2001-07-08 | Paper |