|
Search the dblp DataBase
Bezawada Bruhadeshwar:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sandeep S. Kulkarni, Bezawada Bruhadeshwar
Distributing Key Updates in Secure Dynamic Groups. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:410-419 [Conf]
- Bezawada Bruhadeshwar, Sandeep S. Kulkarni
User Revocation in Secure Adhoc Networks. [Citation Graph (0, 0)][DBLP] ICDCIT, 2005, pp:377-388 [Conf]
- Sandeep S. Kulkarni, Bezawada Bruhadeshwar
Reducing the Cost of the Critical Path in Secure Multicast for Dynamic Groups. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2002, pp:43-48 [Conf]
- Sandeep S. Kulkarni, Bezawada Bruhadeshwar
A Family of Collusion Resistant Protocols for Instantiating Security. [Citation Graph (0, 0)][DBLP] ICNP, 2005, pp:279-288 [Conf]
- Sandeep S. Kulkarni, Bezawada Bruhadeshwar
Rekeying and Storage Cost for Multiple User Revocation. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
Reducing the Cost of Session Key Establishment. [Citation Graph (, )][DBLP]
Routing Protocol Security Using Symmetric Key Based Techniques. [Citation Graph (, )][DBLP]
FormatShield: A Binary Rewriting Defense against Format String Attacks. [Citation Graph (, )][DBLP]
Signature Generation and Detection of Malware Families. [Citation Graph (, )][DBLP]
A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc Networks. [Citation Graph (, )][DBLP]
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. [Citation Graph (, )][DBLP]
A Family of Collusion Resistant Symmetric Key Protocols for Authentication. [Citation Graph (, )][DBLP]
Key-update distribution in secure group communication. [Citation Graph (, )][DBLP]
Automatic analysis of distance bounding protocols [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|