Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Synergistic gains from corporate acquisitions and their division between the stockholders of target and acquiring firms
- Michael Bradley, Anand Desai, E. H. Kim
- Business
- 1 May 1988
This paper documents that a successful tender offer increases the combined value of the target and acquiring firms by an average of 7.4%. We also provide a theoretical analysis of the process of… Expand
Relations among Notions of Security for Public-Key Encryption Schemes
- M. Bellare, Anand Desai, D. Pointcheval, P. Rogaway
- Computer Science, Mathematics
- IACR Cryptol. ePrint Arch.
- 23 August 1998
TLDR
A concrete security treatment of symmetric encryption
- M. Bellare, Anand Desai, E. Jokipii, P. Rogaway
- Mathematics, Computer Science
- Proceedings 38th Annual Symposium on Foundations…
- 19 October 1997
TLDR
Key-Privacy in Public-Key Encryption
- M. Bellare, A. Boldyreva, Anand Desai, D. Pointcheval
- Computer Science
- ASIACRYPT
- 9 December 2001
TLDR
THE RATIONALE BEHIND INTERFIRM TENDER OFFERS Information or Synergy
- Michael Bradley, Anand Desai, E. H. Kim
- Economics
- 1 April 1983
This paper investigates the rationale behind interlirm tender offers by examining the returns realized by the stockholders of lirms that were the targets of unsuccessful tender offers and lirms that… Expand
A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation
- M. Bellare, Anand Desai, E. Jokipii, P. Rogaway
- Computer Science
- FOCS
- 1997
TLDR
- 157
- 10
- PDF
Determination of paths to vendor market efficiency using parallel coordinates representation: A negotiation tool for buyers
- C. A. Weber, Anand Desai
- Economics
- 5 April 1996
Abstract This study demonstrates the use of data envelopment analysis for measuring vendor performance and efficiency. An algorithm by Inselberg is employed for determining points of vendor… Expand
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
- Anand Desai
- Computer Science, Mathematics
- CRYPTO
- 20 August 2000
TLDR
Non-cooperative negotiation strategies for vendor selection
- C. A. Weber, J. Current, Anand Desai
- Economics, Computer Science
- Eur. J. Oper. Res.
- 1 July 1998
TLDR
A Practice-Oriented Treatment of Pseudorandom Number Generators
- Anand Desai, A. Hevia, Y. Yin
- Computer Science, Mathematics
- EUROCRYPT
- 2 May 2002
TLDR