Author of the publication

Let Only the Right One IN: Privacy Management Scheme for Social Network.

, , and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 310-317. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Srinathan, Kannan
add a person with the name Srinathan, Kannan
 

Other publications of authors with the same name

Reporting and counting maximal points in a query orthogonal rectangle., , , and . J. Discrete Algorithms, (2015)Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission., , and . Theor. Comput. Sci., (2013)Generalized Robust Combiners for Oblivious Transfer., , and . ARES, page 510-515. IEEE Computer Society, (2009)Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots., , , and . ARES, page 600-605. IEEE Computer Society, (2009)Secret Sharing for mNP: Completeness Results., and . INDOCRYPT, volume 10095 of Lecture Notes in Computer Science, page 380-390. (2016)On Generalized Planar Skyline and Convex Hull Range Queries., , , , and . WALCOM, volume 8344 of Lecture Notes in Computer Science, page 34-43. Springer, (2014)Perfectly secure message transmission over partially synchronous networks., , and . ICDCN, page 302-306. ACM, (2019)On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks., , , , and . ICDCN, volume 5408 of Lecture Notes in Computer Science, page 148-162. Springer, (2009)On perfectly secret message transmission in digraphs tolerating dual failures., , , and . ICDCN, page 29:1-29:10. ACM, (2016)WYSWYE: shoulder surfing defense for recognition based graphical passwords., , and . OZCHI, page 285-294. ACM, (2012)