C Pandu Rangan


Ontology type: schema:Person     


Person Info

NAME

C Pandu

SURNAME

Rangan

Publications in SciGraph latest 50 shown

  • 2018-04-10 Identity-Based Group Encryption Revisited in INFORMATION AND COMMUNICATIONS SECURITY
  • 2017 Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting in PROVABLE SECURITY
  • 2017 Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE in INFORMATION SECURITY AND PRIVACY
  • 2015 Certificateless and Identity based Authenticated Key Exchange Protocols in E-BUSINESS AND TELECOMMUNICATIONS
  • 2015 Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction in PROVABLE SECURITY
  • 2015-01 Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation in JOURNAL OF CRYPTOLOGY
  • 2014-04 Asynchronous Byzantine Agreement with optimal resilience in DISTRIBUTED COMPUTING
  • 2014 Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme in INFORMATION AND COMMUNICATION TECHNOLOGY
  • 2014 Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters in INFORMATION AND COMMUNICATION TECHNOLOGY
  • 2014 Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme in SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING
  • 2014 A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory in INFORMATION SECURITY AND CRYPTOLOGY -- ICISC 2013
  • 2014 Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model in INFORMATION SECURITY AND CRYPTOLOGY -- ICISC 2013
  • 2013 Internet of Things-Aware Process Modeling: Integrating IoT Devices as Business Process Resources in ACTIVE FLOW AND COMBUSTION CONTROL 2018
  • 2012 Cache Me If You Can: Capacitated Selfish Replication Games in LATIN 2012: THEORETICAL INFORMATICS
  • 2012 A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2012 Threshold Discernible Ring Signatures in E-BUSINESS AND TELECOMMUNICATIONS
  • 2012 An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model in INFORMATION SECURITY AND PRIVACY
  • 2012 Optimal Parameters for Efficient Two-Party Computation Protocols in INFORMATION SECURITY THEORY AND PRACTICE. SECURITY, PRIVACY AND TRUST IN COMPUTING SYSTEMS AND AMBIENT INTELLIGENT ECOSYSTEMS
  • 2011-09-06 Cryptographic Approaches to Denial-of-Service Resistance in AN INVESTIGATION INTO THE DETECTION AND MITIGATION OF DENIAL OF SERVICE (DOS) ATTACKS
  • 2011 A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs in WALCOM: ALGORITHMS AND COMPUTATION
  • 2011 Rational Secret Sharing with Honest Players over an Asynchronous Channel in ADVANCES IN NETWORK SECURITY AND APPLICATIONS
  • 2011 Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience in INFORMATION THEORETIC SECURITY
  • 2011 Attribute Based Signatures for Bounded Multi-level Threshold Circuits in PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS
  • 2010-03 On Conditional Covering Problem in MATHEMATICS IN COMPUTER SCIENCE
  • 2010 Reasoning Elements for a Vehicle Routing System in KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS
  • 2010 Perspective Imaging under Structured Light in COMPUTER VISION – ECCV 2010
  • 2010 Monitoring and Assessment of Environmental Impact by Persistent Organic Pollutants in ARTIFICIAL NEURAL NETWORKS – ICANN 2010
  • 2010 Addition of Recurrent Configurations in Chip Firing Games: Finding Minimal Recurrent Configurations with Markov Chains in CELLULAR AUTOMATA
  • 2010 Flexible Voxels for Motion-Aware Videography in COMPUTER VISION – ECCV 2010
  • 2010 Internal Models in the Cerebellum: A Coupling Scheme for Online and Offline Learning in Procedural Tasks in FROM ANIMALS TO ANIMATS 11
  • 2010 Co-transduction for Shape Retrieval in COMPUTER VISION – ECCV 2010
  • 2010 Blind Source Separation of Overdetermined Linear-Quadratic Mixtures in LATENT VARIABLE ANALYSIS AND SIGNAL SEPARATION
  • 2010 Efficiently Scaling Up Video Annotation with Crowdsourced Marketplaces in COMPUTER VISION – ECCV 2010
  • 2010 Resampling Structure from Motion in COMPUTER VISION – ECCV 2010
  • 2010 A Close-Form Iterative Algorithm for Depth Inferring from a Single Image in COMPUTER VISION – ECCV 2010
  • 2010 Embracing Uncertainty: The New Machine Intelligence in KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS
  • 2010 Consistency Checking Method of Inventory Control for Countermeasures Planning System in KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS
  • 2010 A Dynamic Programming Approach to Reconstructing Building Interiors in COMPUTER VISION – ECCV 2010
  • 2010 Learning a Combination of Heterogeneous Dissimilarities from Incomplete Knowledge in ARTIFICIAL NEURAL NETWORKS – ICANN 2010
  • 2010 Head Finders Inspection: An Unsupervised Optimization Approach in ADVANCES IN NATURAL LANGUAGE PROCESSING
  • 2010 Arcane Information, Solving Relations, and Church Censorship in STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS
  • 2010 Selection of Training Data for Locally Recurrent Neural Network in ARTIFICIAL NEURAL NETWORKS – ICANN 2010
  • 2010 A Logic for Incomplete Sequential Information in KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS
  • 2010 Descriptor Learning for Efficient Retrieval in COMPUTER VISION – ECCV 2010
  • 2010 A Geometry of Networks in STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS
  • 2010 Designing Simple Nonlinear Filters Using Hysteresis of Single Recurrent Neurons for Acoustic Signal Recognition in Robots in ARTIFICIAL NEURAL NETWORKS – ICANN 2010
  • 2010 A Statistical Appraoch to Image Reconstruction from Projections Problem Using Recurrent Neural Network in ARTIFICIAL NEURAL NETWORKS – ICANN 2010
  • 2010 Element-Wise Factorization for N-View Projective Reconstruction in COMPUTER VISION – ECCV 2010
  • 2010 Constrained Complex-Valued ICA without Permutation Ambiguity Based on Negentropy Maximization in LATENT VARIABLE ANALYSIS AND SIGNAL SEPARATION
  • 2010 TectoMT: Modular NLP Framework in ADVANCES IN NATURAL LANGUAGE PROCESSING
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "familyName": "Rangan", 
        "givenName": "C  Pandu", 
        "id": "sg:person.016366027737.61", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T14:02", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1799.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.016366027737.61'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.016366027737.61'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.016366027737.61'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.016366027737.61'


     

    This table displays all metadata directly associated to this object as RDF triples.

    11 TRIPLES      9 PREDICATES      10 URIs      6 LITERALS      1 BLANK NODES

    Subject Predicate Object
    1 sg:person.016366027737.61 schema:familyName Rangan
    2 schema:givenName C Pandu
    3 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61
    4 schema:sdDatePublished 2019-03-07T14:02
    5 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    6 schema:sdPublisher N8b3c92c6db7f4dec8d713f2d35055499
    7 sgo:license sg:explorer/license/
    8 sgo:sdDataset persons
    9 rdf:type schema:Person
    10 N8b3c92c6db7f4dec8d713f2d35055499 schema:name Springer Nature - SN SciGraph project
    11 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...