Blind authentication: a secure crypto-biometric verification protocol M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar IEEE transactions on information forensics and security 5 (2), 255-268, 2010 | 189 | 2010 |
Efficient privacy preserving video surveillance M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar 2009 IEEE 12th international conference on computer vision, 1639-1646, 2009 | 160 | 2009 |
A performance prediction model for the CUDA GPGPU platform K Kothapalli, R Mukherjee, MS Rehman, S Patidar, PJ Narayanan, ... 2009 International Conference on High Performance Computing (HiPC), 463-472, 2009 | 157 | 2009 |
Private content based image retrieval J Shashank, P Kowshik, K Srinathan, CV Jawahar 2008 IEEE conference on computer vision and pattern recognition, 1-8, 2008 | 138 | 2008 |
Automatic keyphrase extraction from scientific documents using N-gram filtration technique N Kumar, K Srinathan Proceedings of the eighth ACM symposium on Document engineering, 199-208, 2008 | 123 | 2008 |
Optimal perfectly secure message transmission K Srinathan, A Narayanan, CP Rangan Annual International Cryptology Conference, 545-561, 2004 | 108 | 2004 |
Certificate-based anonymous device access control scheme for IoT environment S Malani, J Srinivas, AK Das, K Srinathan, M Jo IEEE Internet of Things Journal 6 (6), 9762-9773, 2019 | 105 | 2019 |
On perfectly secure communication over arbitrary networks MVNA Kumar, PR Goundan, K Srinathan, CP Rangan Proceedings of the twenty-first annual symposium on Principles of …, 2002 | 105 | 2002 |
Round-optimal and efficient verifiable secret sharing M Fitzi, J Garay, S Gollakota, CP Rangan, K Srinathan Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006 | 97 | 2006 |
Efficient privacy preserving k-means clustering M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 …, 2010 | 79 | 2010 |
Efficient biometric verification in encrypted domain M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar Advances in Biometrics: Third International Conference, ICB 2009, Alghero …, 2009 | 63 | 2009 |
On the power of computational secret sharing V Vinod, A Narayanan, K Srinathan, CP Rangan, K Kim Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003 | 62 | 2003 |
Alternative protocols for generalized oblivious transfer B Shankar, K Srinathan, CP Rangan Distributed Computing and Networking: 9th International Conference, ICDCN …, 2008 | 60 | 2008 |
Fast and secure real-time video encryption CN Raju, G Umadevi, K Srinathan, CV Jawahar 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing …, 2008 | 50 | 2008 |
Unconditionally reliable and secure message transmission in undirected synchronous networks: Possibility, feasibility and optimality A Patra, A Choudhury, C Pandu Rangan, K Srinathan International Journal of Applied Cryptography 2 (2), 159-197, 2010 | 49 | 2010 |
Efficient asynchronous secure multiparty distributed computation K Srinathan, C Pandu Rangan Progress in Cryptology—INDOCRYPT 2000: First International Conference in …, 2000 | 47 | 2000 |
WYSWYE: shoulder surfing defense for recognition based graphical passwords RA Khot, P Kumaraguru, K Srinathan Proceedings of the 24th Australian Computer-Human Interaction Conference …, 2012 | 40 | 2012 |
Possibility and complexity of probabilistic reliable communication in directed networks K Srinathan, CP Rangan Proceedings of the twenty-fifth annual ACM symposium on Principles of …, 2006 | 39 | 2006 |
Retrieving and routing quantum information in a quantum network S Sazim, V Chiranjeevi, I Chakrabarty, K Srinathan Quantum Information Processing 14 (12), 4651-4664, 2015 | 37 | 2015 |
Constant phase bit optimal protocols for perfectly reliable and secure message transmission A Patra, A Choudhary, K Srinathan, CP Rangan Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006 | 33 | 2006 |