Esha Ghosh
Brown University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Esha Ghosh.
scandinavian workshop on algorithm theory | 2012
Esha Ghosh; Sudeshna Kolay; Mrinal Kumar; Pranabendu Misra; Fahad Panolan; Ashutosh Rai; M. S. Ramanujan
An undirected graph is said to be split if its vertex set can be partitioned into two sets such that the subgraph induced on one of them is a complete graph and the subgraph induced on the other is an independent set. We study the problem of deleting the minimum number of vertices or edges from a given input graph so that the resulting graph is split.We initiate a systematic study and give efficient fixed-parameter algorithms and polynomial sized kernels for the problem. More precisely, 1 for Split Vertex Deletion, the problem of determining whether there are k vertices whose deletion results in a split graph, we give an
computer and communications security | 2016
Dario Fiore; Cédric Fournet; Esha Ghosh; Markulf Kohlweiss; Olga Ohrimenko; Bryan Parno
{\cal O}^*(2^k)
applied cryptography and network security | 2015
Esha Ghosh; Olga Ohrimenko; Roberto Tamassia
algorithm improving on the previous best bound of
privacy enhancing technologies | 2016
Esha Ghosh; Olga Ohrimenko; Roberto Tamassia
{\cal O}^*({2.32^k})
security and cryptography for networks | 2016
Esha Ghosh; Michael T. Goodrich; Olga Ohrimenko; Roberto Tamassia
. We also give an
international cryptology conference | 2016
Esha Ghosh; Olga Ohrimenko; Dimitrios Papadopoulos; Roberto Tamassia; Nikos Triandopoulos
{\cal O}(k^3)
workshop on algorithms and computation | 2011
Esha Ghosh; N. S. Narayanaswamy; C. Pandu Rangan
-sized kernel for the problem. 2 For Split Edge Deletion, the problem of determining whether there are k edges whose deletion results in a split graph, we give an
Algorithmica | 2015
Esha Ghosh; Sudeshna Kolay; Mrinal Kumar; Pranabendu Misra; Fahad Panolan; Ashutosh Rai; M. S. Ramanujan
{\cal O}^*( 2^{ O(\sqrt{k}\log k) })
IACR Cryptology ePrint Archive | 2014
Esha Ghosh; Olga Ohrimenko; Roberto Tamassia
algorithm. We also prove the existence of an
IACR Cryptology ePrint Archive | 2015
Esha Ghosh; Olga Ohrimenko; Dimitrios Papadopoulos; Roberto Tamassia; Nikos Triandopoulos
{\cal O}(k^2)