Srinathan K
Srinathan K
Assistant Professor, IIITH
Verified email at iiit.ac.in
TitleCited byYear
A performance prediction model for the CUDA GPGPU platform
K Kothapalli, R Mukherjee, MS Rehman, S Patidar, PJ Narayanan, ...
2009 International Conference on High Performance Computing (HiPC), 463-472, 2009
1062009
Efficient privacy preserving video surveillance
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
2009 IEEE 12th international conference on computer vision, 1639-1646, 2009
1042009
Automatic keyphrase extraction from scientific documents using N-gram filtration technique
N Kumar, K Srinathan
Proceedings of the eighth ACM symposium on Document engineering, 199-208, 2008
1012008
Blind authentication: a secure crypto-biometric verification protocol
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
IEEE transactions on information forensics and security 5 (2), 255-268, 2010
992010
On perfectly secure communication over arbitrary networks
MVN Kumar, PR Goundan, K Srinathan, CP Rangan
Proceedings of the twenty-first annual symposium on Principles of …, 2002
972002
Private content based image retrieval
J Shashank, P Kowshik, K Srinathan, CV Jawahar
2008 IEEE Conference on Computer Vision and Pattern Recognition, 1-8, 2008
952008
Optimal perfectly secure message transmission
K Srinathan, A Narayanan, CP Rangan
Annual International Cryptology Conference, 545-561, 2004
942004
Round-optimal and efficient verifiable secret sharing
M Fitzi, J Garay, S Gollakota, CP Rangan, K Srinathan
Theory of Cryptography Conference, 329-342, 2006
712006
Efficient privacy preserving k-means clustering
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
Pacific-Asia Workshop on Intelligence and Security Informatics, 154-166, 2010
422010
On the power of computational secret sharing
V Vinod, A Narayanan, K Srinathan, CP Rangan, K Kim
International Conference on Cryptology in India, 162-176, 2003
422003
Efficient biometric verification in encrypted domain
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
International Conference on Biometrics, 899-908, 2009
412009
Unconditionally reliable and secure message transmission in undirected synchronous networks: Possibility, feasibility and optimality
A Patra, A Choudhury, C Pandu Rangan, K Srinathan
International Journal of Applied Cryptography 2 (2), 159-197, 2010
392010
Alternative protocols for generalized oblivious transfer
B Shankar, K Srinathan, CP Rangan
International Conference on Distributed Computing and Networking, 304-309, 2008
392008
Possibility and complexity of probabilistic reliable communication in directed networks
K Srinathan, CP Rangan
Proceedings of the twenty-fifth annual ACM symposium on Principles of …, 2006
382006
Fast and secure real-time video encryption
CN Raju, G Umadevi, K Srinathan, CV Jawahar
2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing …, 2008
352008
Constant phase bit optimal protocols for perfectly reliable and secure message transmission
A Patra, A Choudhary, K Srinathan, CP Rangan
International Conference on Cryptology in India, 221-235, 2006
342006
Efficient asynchronous secure multiparty distributed computation
K Srinathan, CP Rangan
International Conference on Cryptology in India, 117-129, 2000
332000
Unconditionally reliable message transmission in directed networks
B Shankar, P Gopal, K Srinathan, CP Rangan
Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete …, 2008
292008
Theory of cryptography
S Halevi, T Rabin
third theory of cryptography conference, TCC, 4-7, 2006
272006
WYSWYE: shoulder surfing defense for recognition based graphical passwords
RA Khot, P Kumaraguru, K Srinathan
Proceedings of the 24th Australian Computer-Human Interaction Conference …, 2012
252012
The system can't perform the operation now. Try again later.
Articles 1–20