K. Srinathan
Orcid: 0009-0002-4306-6707
According to our database1,
K. Srinathan
authored at least 121 papers
between 2000 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the Fourteenth Indian Conference on Computer Vision, 2023
2022
Proceedings of the IEEE International Joint Conference on Biometrics, 2022
2021
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
2019
IEEE Internet Things J., 2019
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019
2018
IEEE Trans. Inf. Theory, 2018
On minimal connectivity requirements for secure message transmission in directed networks.
Inf. Process. Lett., 2018
2017
Proceedings of the 46th International Conference on Parallel Processing, 2017
2016
Unsupervised deep semantic and logical analysis for identification of solution posts from community answers.
Int. J. Inf. Decis. Sci., 2016
A graph-based unsupervised N-gram filtration technique for automatic keyphrase extraction.
Int. J. Data Min. Model. Manag., 2016
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach.
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016
2015
Quantum Inf. Process., 2015
J. Discrete Algorithms, 2015
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015
Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015
2014
Inf. Process. Lett., 2014
Proceedings of the Algorithms and Computation - 8th International Workshop, 2014
Proceedings of the Applied Algorithms - First International Conference, 2014
Proceedings of the 26th Canadian Conference on Computational Geometry, 2014
2013
Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission.
Theor. Comput. Sci., 2013
Proceedings of the WALCOM: Algorithms and Computation, 7th International Workshop, 2013
A Knowledge Induced Graph-Theoretical Model for Extract and Abstract Single Document Summarization.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2013
Allowing Multiple Rounds in the Shared Whiteboard Model: Some More Impossibility Results.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013
2012
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission.
J. ACM, 2012
Proceedings of the WALCOM: Algorithms and Computation - 6th International Workshop, 2012
Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI '12, Melbourne, VIC, Australia - November 26, 2012
Using Wikipedia Anchor Text and Weighted Clustering Coefficient to Enhance the Traditional Multi-document Summarization.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2012
Using Graph Based Mapping of Co-occurring Words and Closeness Centrality Score for Summarization Evaluation.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2012
2011
J. Parallel Distributed Comput., 2011
J. Math. Model. Algorithms, 2011
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Distributed Computing - 25th International Symposium, 2011
Proceedings of the WALCOM: Algorithms and Computation - 5th International Workshop, 2011
Proceedings of the Fourth Text Analysis Conference, 2011
Proceedings of the 3rd International Conference on Human Computer Interaction, 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Data Mining Workshops (ICDMW), 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the 23rd Annual Canadian Conference on Computational Geometry, 2011
Proceedings of the 23rd Annual Canadian Conference on Computational Geometry, 2011
Proceedings of the 23rd Annual Canadian Conference on Computational Geometry, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality.
Int. J. Appl. Cryptogr., 2010
Proceedings of the Distributed Computing, 24th International Symposium, 2010
Proceedings of the Third Text Analysis Conference, 2010
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010
Exploiting N-gram Importance and Wikipedia based Additional Knowledge for Improvements in GAAC based Document Clustering.
Proceedings of the KDIR 2010, 2010
Evaluating Information Coverage in Machine Generated Summary and Variable Length Documents.
Proceedings of the 16th International Conference on Management of Data, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
Int. J. Appl. Cryptogr., 2009
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009
Brief announcement: global consistency can be easier than point-to-point communication.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009
Proceedings of the IEEE 12th International Conference on Computer Vision, ICCV 2009, Kyoto, Japan, September 27, 2009
Proceedings of the Advances in Biometrics, Third International Conference, 2009
Proceedings of the 16th International Conference on High Performance Computing, 2009
Proceedings of the 21st Annual Canadian Conference on Computational Geometry, 2009
Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2008
Efficient single phase unconditionally secure message transmission with optimum communication complexity.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
Covering hostile terrains with partial and complete visibilities: On minimum distance paths.
Proceedings of the 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2008
Proceedings of the Sixth Indian Conference on Computer Vision, Graphics & Image Processing, 2008
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary.
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the International Conference on Image Processing, 2008
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
Automatic keyphrase extraction from scientific documents using N-gram filtration technique.
Proceedings of the 2008 ACM Symposium on Document Engineering, 2008
Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 2008
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008
Privacy Preserving Shortest Path Computation in Presence of Convex Polygonal Obstacles.
Proceedings of the The Third International Conference on Availability, 2008
2007
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary.
Proceedings of the Distributed Computing, 21st International Symposium, 2007
On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Privacy Preserving Computation of Shortest Path in Presence of a Single Convex Polygonal Obstacle.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality.
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Proceedings of the Distributed Computing and Internet Technology, 2007
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Possibility and complexity of probabilistic reliable communication in directed networks.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission.
Proceedings of the Progress in Cryptology, 2006
2004
Proceedings of the Distributed Computing, 18th International Conference, 2004
Brief announcement: on the round complexity of distributed consensus over synchronous networks.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Brief announcement: efficient perfectly secure communication over synchronous networks.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
Proceedings of the Progress in Cryptology, 2003
2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Progress in Cryptology, 2001
2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the Progress in Cryptology, 2000