default search action
Shweta Agrawal
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c55]Shweta Agrawal, Sagnik Saha, Nikolaj I. Schwartzbach, Akhil Vanukuri, Prashant Nalini Vasudevan:
k-SUM in the Sparse Regime: Complexity and Applications. CRYPTO (2) 2024: 315-351 - [c54]Shweta Agrawal, Simran Kumari, Shota Yamada:
Attribute Based Encryption for Turing Machines from Lattices. CRYPTO (3) 2024: 352-386 - [i48]Shweta Agrawal, Simran Kumari, Ryo Nishimaki:
Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security. IACR Cryptol. ePrint Arch. 2024: 1294 (2024) - [i47]Shweta Agrawal, Simran Kumari, Shota Yamada:
Compact Pseudorandom Functional Encryption from Evasive LWE. IACR Cryptol. ePrint Arch. 2024: 1719 (2024) - [i46]Shweta Agrawal, Simran Kumari, Shota Yamada:
Pseudorandom Multi-Input Functional Encryption and Applications. IACR Cryptol. ePrint Arch. 2024: 1720 (2024) - 2023
- [c53]Shweta Agrawal, Junichi Tomida, Anshu Yadav:
Attribute-Based Multi-input FE (and More) for Attribute-Weighted Sums. CRYPTO (4) 2023: 464-497 - [c52]Shweta Agrawal, Mélissa Rossi, Anshu Yadav, Shota Yamada:
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE. CRYPTO (4) 2023: 532-564 - [c51]Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Public Key Encryption with Secure Key Leasing. EUROCRYPT (1) 2023: 581-610 - [c50]Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada:
Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness. EUROCRYPT (3) 2023: 605-636 - [c49]Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti:
Quadratic Functional Encryption for Secure Training in Vertical Federated Learning. ISIT 2023: 60-65 - [c48]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, Jayesh Singla:
CASE: A New Frontier in Public-Key Authenticated Encryption. TCC (2) 2023: 189-219 - [i45]Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Public Key Encryption with Secure Key Leasing. CoRR abs/2302.11663 (2023) - [i44]Shweta Agrawal, Sagnik Saha, Nikolaj I. Schwartzbach, Akhil Vanukuri, Prashant Nalini Vasudevan:
k-SUM in the Sparse Regime. CoRR abs/2304.01787 (2023) - [i43]Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti:
Quadratic Functional Encryption for Secure Training in Vertical Federated Learning. CoRR abs/2305.08358 (2023) - [i42]Shweta Agrawal, Sagnik Saha, Nikolaj I. Schwartzbach, Akhil Vanukuri, Prashant Nalini Vasudevan:
k-SUM in the Sparse Regime. Electron. Colloquium Comput. Complex. TR23 (2023) - [i41]Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Public Key Encryption with Secure Key Leasing. IACR Cryptol. ePrint Arch. 2023: 264 (2023) - [i40]Shweta Agrawal, Sagnik Saha, Nikolaj I. Schwartzbach, Akhil Vanukuri, Prashant Nalini Vasudevan:
k-SUM in the Sparse Regime. IACR Cryptol. ePrint Arch. 2023: 488 (2023) - [i39]Shweta Agrawal, Melissa Rossi, Anshu Yadav, Shota Yamada:
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE. IACR Cryptol. ePrint Arch. 2023: 941 (2023) - [i38]Shweta Agrawal, Junichi Tomida, Anshu Yadav:
Attribute-Based Multi-Input FE (and more) for Attribute-Weighted Sums. IACR Cryptol. ePrint Arch. 2023: 1191 (2023) - [i37]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, Jayesh Singla:
CASE: A New Frontier in Public-Key Authenticated Encryption. IACR Cryptol. ePrint Arch. 2023: 1786 (2023) - 2022
- [j4]Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada:
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013. Des. Codes Cryptogr. 90(10): 2301-2318 (2022) - [j3]Tao Hai, Jincheng Zhou, S. R. Srividhya, Sanjiv Kumar Jain, Praise Young, Shweta Agrawal:
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system. J. Cloud Comput. 11: 22 (2022) - [j2]Tao Hai, Jincheng Zhou, Ning Li, Sanjiv Kumar Jain, Shweta Agrawal, Imed Ben Dhaou:
Cloud-based bug tracking software defects analysis using deep learning. J. Cloud Comput. 11: 32 (2022) - [j1]Shailesh Gondal, Shweta Agrawal, Anil Kumar:
Analysis of Citrus Diseases and Classification Based on Deep Learning Models. J. Uncertain Syst. 15(3): 2241010:1-2241010:17 (2022) - [c47]Shweta Agrawal, Elena Kirshanova, Damien Stehlé, Anshu Yadav:
Practical, Round-Optimal Lattice-Based Blind Signatures. CCS 2022: 39-53 - [c46]Shweta Agrawal, Anshu Yadav, Shota Yamada:
Multi-input Attribute Based Encryption and Predicate Encryption. CRYPTO (1) 2022: 590-621 - [c45]Shweta Agrawal, Damien Stehlé, Anshu Yadav:
Round-Optimal Lattice-Based Threshold Signatures, Revisited. ICALP 2022: 8:1-8:20 - [c44]Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions. TCC (1) 2022: 618-647 - [c43]Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality. TCC (1) 2022: 711-740 - [e4]Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13791, Springer 2022, ISBN 978-3-031-22962-6 [contents] - [e3]Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13792, Springer 2022, ISBN 978-3-031-22965-7 [contents] - [e2]Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13793, Springer 2022, ISBN 978-3-031-22968-8 [contents] - [e1]Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV. Lecture Notes in Computer Science 13794, Springer 2022, ISBN 978-3-031-22971-8 [contents] - [i36]Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions. IACR Cryptol. ePrint Arch. 2022: 316 (2022) - [i35]Shweta Agrawal, Damien Stehlé, Anshu Yadav:
Round-Optimal Lattice-Based Threshold Signatures, Revisited. IACR Cryptol. ePrint Arch. 2022: 634 (2022) - [i34]Shweta Agrawal, Anshu Yadav, Shota Yamada:
Multi-Input Attribute Based Encryption and Predicate Encryption. IACR Cryptol. ePrint Arch. 2022: 1024 (2022) - [i33]Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality. IACR Cryptol. ePrint Arch. 2022: 1168 (2022) - [i32]Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada:
Trace and Revoke with Optimal Parameters from Polynomial Hardness. IACR Cryptol. ePrint Arch. 2022: 1347 (2022) - 2021
- [c42]Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran, Alon Rosen:
Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration. CRYPTO (2) 2021: 124-154 - [c41]Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-input Quadratic Functional Encryption from Pairings. CRYPTO (4) 2021: 208-238 - [c40]Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada:
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE. CRYPTO (4) 2021: 239-269 - [c39]Shweta Agrawal, Shafi Goldwasser, Saleet Mossel:
Deniable Fully Homomorphic Encryption from Learning with Errors. CRYPTO (2) 2021: 641-670 - [c38]Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-Party Functional Encryption. TCC (2) 2021: 224-255 - [i31]Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada:
Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in TCC 2013. IACR Cryptol. ePrint Arch. 2021: 505 (2021) - [i30]Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada:
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE. IACR Cryptol. ePrint Arch. 2021: 848 (2021) - [i29]Shweta Agrawal, Elena Kirshanova, Damien Stehlé, Anshu Yadav:
Can Round-Optimal Lattice-Based Blind Signatures be Practical? IACR Cryptol. ePrint Arch. 2021: 1565 (2021) - 2020
- [c37]Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran, Alon Rosen:
Cryptography from One-Way Communication: On Completeness of Finite Channels. ASIACRYPT (3) 2020: 653-685 - [c36]Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran:
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing. ESORICS (1) 2020: 42-63 - [c35]Shweta Agrawal, Shota Yamada:
Optimal Broadcast Encryption from Pairings and LWE. EUROCRYPT (1) 2020: 13-43 - [c34]Shweta Agrawal, Alice Pellet-Mary:
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE. EUROCRYPT (1) 2020: 110-140 - [c33]Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O'Neill, Justin Thaler:
Ad Hoc Multi-Input Functional Encryption. ITCS 2020: 40:1-40:41 - [c32]Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu:
Adaptive Simulation Security for Inner Product Functional Encryption. Public Key Cryptography (1) 2020: 34-64 - [c31]Shweta Agrawal, Shota Yamada:
CP-ABE for Circuits (and More) in the Symmetric Key Setting. TCC (1) 2020: 117-148 - [c30]Shweta Agrawal, Daniel Wichs, Shota Yamada:
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model. TCC (1) 2020: 149-178 - [i28]Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu:
Adaptive Simulation Security for Inner Product Functional Encryption. IACR Cryptol. ePrint Arch. 2020: 209 (2020) - [i27]Shweta Agrawal, Shota Yamada:
Optimal Broadcast Encryption from Pairings and LWE. IACR Cryptol. ePrint Arch. 2020: 228 (2020) - [i26]Shweta Agrawal, Alice Pellet-Mary:
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE. IACR Cryptol. ePrint Arch. 2020: 415 (2020) - [i25]Shweta Agrawal, Daniel Wichs, Shota Yamada:
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 1179 (2020) - [i24]Shweta Agrawal, Rishab Goyal, Fabrice Mouhartem:
Multi-Party Functional Encryption. IACR Cryptol. ePrint Arch. 2020: 1266 (2020) - [i23]Shweta Agrawal, Shota Yamada:
CP-ABE for Circuits (and more) in the Symmetric Key Setting. IACR Cryptol. ePrint Arch. 2020: 1432 (2020) - [i22]Shweta Agrawal, Shafi Goldwasser, Saleet Mossel:
Deniable Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2020: 1588 (2020)
2010 – 2019
- 2019
- [c29]Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE. CRYPTO (2) 2019: 765-797 - [c28]Shweta Agrawal:
Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation. EUROCRYPT (1) 2019: 191-225 - [c27]Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption for Deterministic Finite Automata from \mathsfDLIN. TCC (2) 2019: 91-117 - [i21]Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O'Neill, Justin Thaler:
Ad Hoc Multi-Input Functional Encryption. IACR Cryptol. ePrint Arch. 2019: 356 (2019) - [i20]Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE. IACR Cryptol. ePrint Arch. 2019: 629 (2019) - [i19]Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption for Deterministic Finite Automata from DLIN. IACR Cryptol. ePrint Arch. 2019: 645 (2019) - [i18]Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran:
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing. IACR Cryptol. ePrint Arch. 2019: 1262 (2019) - 2018
- [c26]Aswin Rajagopalan, Andrew Thangaraj, Shweta Agrawal:
Wiretap Polar Codes in Encryption Schemes Based on Learning with Errors Problem. ISIT 2018: 1146-1150 - [c25]Shweta Agrawal, Monosij Maitra:
FE and iO for Turing Machines from Minimal Assumptions. TCC (2) 2018: 473-512 - [i17]Shweta Agrawal:
New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation. IACR Cryptol. ePrint Arch. 2018: 633 (2018) - [i16]Shweta Agrawal, Monosij Maitra:
FE and iO for Turing Machines from Minimal Assumptions. IACR Cryptol. ePrint Arch. 2018: 908 (2018) - 2017
- [c24]Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada:
Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract. CCS 2017: 2277-2293 - [c23]Shweta Agrawal:
Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks. CRYPTO (1) 2017: 3-35 - [c22]Shweta Agrawal, Ishaan Preet Singh:
Reusable Garbled Deterministic Finite Automata from Learning With Errors. ICALP 2017: 36:1-36:13 - [c21]Shweta Agrawal, Alon Rosen:
Functional Encryption for Bounded Collusions, Revisited. TCC (1) 2017: 173-205 - [i15]Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada:
Efficient Public Trace and Revoke from Standard Assumptions. IACR Cryptol. ePrint Arch. 2017: 650 (2017) - 2016
- [c20]Shweta Agrawal, Benoît Libert, Damien Stehlé:
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions. CRYPTO (3) 2016: 333-362 - [c19]Shweta Agrawal, Ran Gelles, Amit Sahai:
Adaptive protocols for interactive communication. ISIT 2016: 595-599 - [i14]Shweta Agrawal, Alon Rosen:
Online-Offline Functional Encryption for Bounded Collusions. IACR Cryptol. ePrint Arch. 2016: 361 (2016) - [i13]Shweta Agrawal:
Interpolating Predicate and Functional Encryption from Learning With Errors. IACR Cryptol. ePrint Arch. 2016: 654 (2016) - 2015
- [c18]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran:
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data. EUROCRYPT (2) 2015: 501-531 - [c17]Shweta Agrawal, Yuval Ishai, Dakshita Khurana, Anat Paskin-Cherniavsky:
Statistical Randomized Encodings: A Complexity Theoretic View. ICALP (1) 2015: 1-13 - [c16]Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:
On the Practical Security of Inner Product Functional Encryption. Public Key Cryptography 2015: 777-798 - 2014
- [i12]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran:
Towards a Unified Theory of Cryptographic Agents. IACR Cryptol. ePrint Arch. 2014: 480 (2014) - 2013
- [c15]Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai:
Discrete Gaussian Leftover Hash Lemma over Infinite Domains. ASIACRYPT (1) 2013: 97-116 - [c14]Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
On Continual Leakage of Discrete Log Representations. ASIACRYPT (2) 2013: 401-420 - [c13]Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Functional Encryption: New Perspectives and Lower Bounds. CRYPTO (2) 2013: 500-518 - [i11]Shweta Agrawal, Ran Gelles, Amit Sahai:
Adaptive Protocols for Interactive Communication. CoRR abs/1312.4182 (2013) - [i10]Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results. IACR Cryptol. ePrint Arch. 2013: 744 (2013) - 2012
- [c12]Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai:
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation. CRYPTO 2012: 443-460 - [c11]Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee:
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices. Public Key Cryptography 2012: 280-297 - [i9]Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
On Continual Leakage of Discrete Log Representations. IACR Cryptol. ePrint Arch. 2012: 367 (2012) - [i8]Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Functional Encryption: New Perspectives and Lower Bounds. IACR Cryptol. ePrint Arch. 2012: 468 (2012) - [i7]Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai:
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation. IACR Cryptol. ePrint Arch. 2012: 555 (2012) - [i6]Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai:
Sampling Discrete Gaussians Efficiently and Obliviously. IACR Cryptol. ePrint Arch. 2012: 714 (2012) - 2011
- [c10]Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan:
Functional Encryption for Inner Product Predicates from Learning with Errors. ASIACRYPT 2011: 21-40 - [c9]Shweta Agrawal, Sriram Vishwanath:
Secrecy using compressive sensing. ITW 2011: 563-567 - [i5]Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan:
Functional Encryption for Inner Product Predicates from Learning with Errors. IACR Cryptol. ePrint Arch. 2011: 410 (2011) - [i4]Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee:
Fuzzy Identity Based Encryption from Lattices. IACR Cryptol. ePrint Arch. 2011: 414 (2011) - 2010
- [c8]Raj Kamal, Shweta Agrawal:
A design framework of Orchestrator for computing systems. CISIM 2010: 410-413 - [c7]Shweta Agrawal, Dan Boneh, Xavier Boyen:
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. CRYPTO 2010: 98-115 - [c6]Shweta Agrawal, Dan Boneh, Xavier Boyen:
Efficient Lattice (H)IBE in the Standard Model. EUROCRYPT 2010: 553-572 - [c5]Abhik Kumar Das, Shweta Agrawal, Sriram Vishwanath:
On algebraic traceback in dynamic networks. ISIT 2010: 1903-1907 - [c4]Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman:
Preventing Pollution Attacks in Multi-source Network Coding. Public Key Cryptography 2010: 161-176 - [i3]Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman:
Preventing Pollution Attacks in Multi-Source Network Coding. IACR Cryptol. ePrint Arch. 2010: 183 (2010)
2000 – 2009
- 2009
- [c3]Shweta Agrawal, Dan Boneh:
Homomorphic MACs: MAC-Based Integrity for Network Coding. ACNS 2009: 292-305 - [c2]Shweta Agrawal, Sriram Vishwanath:
On the secrecy rate of interference networks using structured codes. ISIT 2009: 2091-2095 - [i2]Shweta Agrawal, Sriram Vishwanath:
On the Secrecy Rate of Interference Networks using structured codes. CoRR abs/0905.2159 (2009) - [i1]Abhik Kumar Das, Shweta Agrawal, Sriram Vishwanath:
Algebraic Traceback for Dynamic Networks. CoRR abs/0908.0078 (2009) - 2004
- [c1]Shweta Agrawal, Krithi Ramamritham, Shetal Shah:
Construction of a Coherency Preserving Dynamic Data Dissemination Network. RTSS 2004: 286-295
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint