Srinathan K
Srinathan K
Assistant Professor, IIITH
Verified email at iiit.ac.in
Title
Cited by
Cited by
Year
Blind authentication: a secure crypto-biometric verification protocol
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
IEEE transactions on information forensics and security 5 (2), 255-268, 2010
1482010
Efficient privacy preserving video surveillance
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
2009 IEEE 12th international conference on computer vision, 1639-1646, 2009
1372009
A performance prediction model for the CUDA GPGPU platform
K Kothapalli, R Mukherjee, MS Rehman, S Patidar, PJ Narayanan, ...
2009 International Conference on High Performance Computing (HiPC), 463-472, 2009
1362009
Private content based image retrieval
J Shashank, P Kowshik, K Srinathan, CV Jawahar
2008 IEEE Conference on Computer Vision and Pattern Recognition, 1-8, 2008
1162008
Automatic keyphrase extraction from scientific documents using N-gram filtration technique
N Kumar, K Srinathan
Proceedings of the eighth ACM symposium on Document engineering, 199-208, 2008
1082008
On perfectly secure communication over arbitrary networks
MVNA Kumar, PR Goundan, K Srinathan, CP Rangan
Proceedings of the twenty-first annual symposium on Principles of …, 2002
1022002
Optimal perfectly secure message transmission
K Srinathan, A Narayanan, CP Rangan
Annual International Cryptology Conference, 545-561, 2004
992004
Round-optimal and efficient verifiable secret sharing
M Fitzi, J Garay, S Gollakota, CP Rangan, K Srinathan
Theory of Cryptography Conference, 329-342, 2006
882006
Efficient privacy preserving k-means clustering
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
Pacific-Asia Workshop on Intelligence and Security Informatics, 154-166, 2010
582010
Efficient biometric verification in encrypted domain
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
International Conference on Biometrics, 899-908, 2009
492009
Alternative protocols for generalized oblivious transfer
B Shankar, K Srinathan, CP Rangan
International Conference on Distributed Computing and Networking, 304-309, 2008
482008
On the power of computational secret sharing
V Vinod, A Narayanan, K Srinathan, CP Rangan, K Kim
International Conference on Cryptology in India, 162-176, 2003
452003
Fast and secure real-time video encryption
CN Raju, G Umadevi, K Srinathan, CV Jawahar
2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing …, 2008
432008
Unconditionally reliable and secure message transmission in undirected synchronous networks: Possibility, feasibility and optimality
A Patra, A Choudhury, C Pandu Rangan, K Srinathan
International Journal of Applied Cryptography 2 (2), 159-197, 2010
422010
Efficient asynchronous secure multiparty distributed computation
K Srinathan, CP Rangan
International Conference on Cryptology in India, 117-129, 2000
402000
Possibility and complexity of probabilistic reliable communication in directed networks
K Srinathan, CP Rangan
Proceedings of the twenty-fifth annual ACM symposium on Principles of …, 2006
382006
WYSWYE: shoulder surfing defense for recognition based graphical passwords
RA Khot, P Kumaraguru, K Srinathan
Proceedings of the 24th Australian Computer-Human Interaction Conference …, 2012
332012
Certificate-based anonymous device access control scheme for IoT environment
S Malani, J Srinivas, AK Das, K Srinathan, M Jo
IEEE Internet of Things Journal 6 (6), 9762-9773, 2019
322019
Constant phase bit optimal protocols for perfectly reliable and secure message transmission
A Patra, A Choudhary, K Srinathan, CP Rangan
International Conference on Cryptology in India, 221-235, 2006
302006
Unconditionally reliable message transmission in directed networks.
B Shankar, P Gopal, K Srinathan, CP Rangan
SODA 8, 1048-1055, 2008
282008
The system can't perform the operation now. Try again later.
Articles 1–20