Search the dblp DataBase
Umesh Shankar :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Umesh Shankar , Chris Karlof Doppelganger: Better browser privacy without the bother. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:154-167 [Conf ] Umesh Shankar , Trent Jaeger , Reiner Sailer Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] David L. Donoho , Ana Georgina Flesia , Umesh Shankar , Vern Paxson , Jason Coit , Stuart Staniford Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:17-35 [Conf ] Trent Jaeger , Reiner Sailer , Umesh Shankar PRIMA: policy-reduced integrity measurement architecture. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:19-28 [Conf ] Umesh Shankar , Vern Paxson Active Mapping: Resisting NIDS Evasion without Altering Traffic. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:44-61 [Conf ] Umesh Shankar , Monica Chew , J. D. Tygar Side Effects Are Not Sufficient to Authenticate Software. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:89-102 [Conf ] Naveen Sastry , Umesh Shankar , David Wagner Secure verification of location claims. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2003, pp:1-10 [Conf ] Dynamic pharming attacks and locked same-origin policies for web browsers. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs