|
Search the dblp DataBase
Ashish Gehani:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Fareed Zaffar, Gershon Kedem, Ashish Gehani
Paranoid: A Global Secure File Access Control System. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:322-332 [Conf]
- Ashish Gehani, Thomas H. LaBean, John H. Reif
DNA-based Cryptography. [Citation Graph (0, 0)][DBLP] Aspects of Molecular Computing, 2004, pp:167-188 [Conf]
- Ashish Gehani, Surendar Chandra, Gershon Kedem
Augmenting storage with an intrusion response primitive to ensure the security of critical data. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:114-124 [Conf]
- Ashish Gehani, Gershon Kedem
RheoStat: Real-Time Risk Management. [Citation Graph (0, 0)][DBLP] RAID, 2004, pp:296-314 [Conf]
- Ashish Gehani, Surendar Chandra
PAST: Probabilistic Authentication of Sensor Timestamps. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:439-448 [Conf]
- Surendar Chandra, Ashish Gehani, Xuwen Yu
Automated Storage Reclamation Using Temporal Importance Annotations. [Citation Graph (0, 0)][DBLP] ICDCS, 2007, pp:12- [Conf]
Bonsai: Balanced Lineage Authentication. [Citation Graph (, )][DBLP]
Steps Toward Managing Lineage Metadata in Grid Clusters. [Citation Graph (, )][DBLP]
Efficient querying of distributed provenance stores. [Citation Graph (, )][DBLP]
Mendel: efficiently verifying the lineage of data modified in multiple trust domains. [Citation Graph (, )][DBLP]
Super-Resolution Video Analysis for Forensic Investigations. [Citation Graph (, )][DBLP]
Performance and extension of user space file systems. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|