Srinathan K
Srinathan K
Assistant Professor, IIITH
Verified email at
Cited by
Cited by
Blind authentication: a secure crypto-biometric verification protocol
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
IEEE transactions on information forensics and security 5 (2), 255-268, 2010
Efficient privacy preserving video surveillance
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
2009 IEEE 12th international conference on computer vision, 1639-1646, 2009
A performance prediction model for the CUDA GPGPU platform
K Kothapalli, R Mukherjee, MS Rehman, S Patidar, PJ Narayanan, ...
2009 International Conference on High Performance Computing (HiPC), 463-472, 2009
Private content based image retrieval
J Shashank, P Kowshik, K Srinathan, CV Jawahar
2008 IEEE conference on computer vision and pattern recognition, 1-8, 2008
Automatic keyphrase extraction from scientific documents using N-gram filtration technique
N Kumar, K Srinathan
Proceedings of the eighth ACM symposium on Document engineering, 199-208, 2008
Optimal perfectly secure message transmission
K Srinathan, A Narayanan, CP Rangan
Annual International Cryptology Conference, 545-561, 2004
On perfectly secure communication over arbitrary networks
MVNA Kumar, PR Goundan, K Srinathan, CP Rangan
Proceedings of the twenty-first annual symposium on Principles of …, 2002
Certificate-based anonymous device access control scheme for IoT environment
S Malani, J Srinivas, AK Das, K Srinathan, M Jo
IEEE Internet of Things Journal 6 (6), 9762-9773, 2019
Round-optimal and efficient verifiable secret sharing
M Fitzi, J Garay, S Gollakota, CP Rangan, K Srinathan
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
Efficient privacy preserving k-means clustering
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 …, 2010
Efficient biometric verification in encrypted domain
M Upmanyu, AM Namboodiri, K Srinathan, CV Jawahar
Advances in Biometrics: Third International Conference, ICB 2009, Alghero …, 2009
On the power of computational secret sharing
V Vinod, A Narayanan, K Srinathan, CP Rangan, K Kim
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
Alternative protocols for generalized oblivious transfer
B Shankar, K Srinathan, CP Rangan
Distributed Computing and Networking: 9th International Conference, ICDCN …, 2008
Fast and secure real-time video encryption
CN Raju, G Umadevi, K Srinathan, CV Jawahar
2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing …, 2008
Unconditionally reliable and secure message transmission in undirected synchronous networks: Possibility, feasibility and optimality
A Patra, A Choudhury, C Pandu Rangan, K Srinathan
International Journal of Applied Cryptography 2 (2), 159-197, 2010
Efficient asynchronous secure multiparty distributed computation
K Srinathan, C Pandu Rangan
Progress in Cryptology—INDOCRYPT 2000: First International Conference in …, 2000
WYSWYE: shoulder surfing defense for recognition based graphical passwords
RA Khot, P Kumaraguru, K Srinathan
Proceedings of the 24th Australian Computer-Human Interaction Conference …, 2012
Possibility and complexity of probabilistic reliable communication in directed networks
K Srinathan, CP Rangan
Proceedings of the twenty-fifth annual ACM symposium on Principles of …, 2006
Retrieving and routing quantum information in a quantum network
S Sazim, V Chiranjeevi, I Chakrabarty, K Srinathan
Quantum Information Processing 14 (12), 4651-4664, 2015
Constant phase bit optimal protocols for perfectly reliable and secure message transmission
A Patra, A Choudhary, K Srinathan, CP Rangan
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20