Browse College of Engineering by Contributor "Prabhakaran, Manoj"

  • Agrawal, Shashank (2015-12-01)
    Over the last decade or so, thanks to remarkable breakthroughs in cryptographic techniques, a wave of ''cryptographic objects'' -- identity-based encryption, fully-homomorphic encryption, functional encryption, and most ...

    application/pdf

    application/pdfPDF (857kB)
  • Maji, Hemanta K. (2012-02-06)
    In cryptographic protocols, honest parties would prefer that their security is assured even in presence of adversarial parties who have unbounded computational power. Information theoretic secure realization of cryptographic ...

    application/pdf

    application/pdfPDF (1MB)
  • Moseley, Benjamin (2012-09-18)
    In this thesis we study scheduling problems that occur in the client server setting. In this setting there are a set of jobs that are sent by clients over time to a sever. There is a scheduler at the sever that determines ...

    application/pdf

    application/pdfPDF (1MB)
  • Rosulek, Michael J. (2009-09-08)
    Secure multi-party computation is a conceptual framework in which distrusting parties engage in a protocol to securely perform a computational task. Depending on the precise model of security, different sets of tasks admit ...

    application/pdf

    application/pdfPDF (1MB)