The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Josyula R. Rao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi
    The EM Side-Channel(s). [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:29-45 [Conf]
  2. Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
    Multi-channel Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:2-16 [Conf]
  3. Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm
    Templates as Master Keys. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:15-29 [Conf]
  4. Suresh Chari, Josyula R. Rao, Pankaj Rohatgi
    Template Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:13-28 [Conf]
  5. Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, Pankaj Rohatgi
    Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:171-184 [Conf]
  6. Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi
    Towards Sound Approaches to Counteract Power-Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:398-412 [Conf]
  7. Josyula R. Rao
    Eventual determinism: using probabilistic means to achieve deterministic ends. [Citation Graph (0, 0)][DBLP]
    HICSS (2), 1995, pp:29-38 [Conf]
  8. Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha
    An IPSec-based Host Architecture for Secure Internet Multicast. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  9. Josyula R. Rao
    Reasoning About Probabilistic Algorithms. [Citation Graph (0, 0)][DBLP]
    PODC, 1990, pp:247-264 [Conf]
  10. Charanjit S. Jutla, Edgar Knapp, Josyula R. Rao
    A Predicate Transformer Approach to Semantics of Parallel Programs. [Citation Graph (0, 0)][DBLP]
    PODC, 1989, pp:249-263 [Conf]
  11. Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stephane Tinguely
    Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:31-0 [Conf]
  12. Rangachari Anand, Nayeem Islam, Trent Jaeger, Josyula R. Rao
    A Flexible Security Model for Using Internet Content. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1997, pp:89-96 [Conf]
  13. Joshua S. Auerbach, Arthur P. Goldberg, Germán S. Goldszmidt, Ajei S. Gopal, Mark T. Kennedy, Josyula R. Rao, James R. Russell
    Concert/C: A Language for Distributed Programming. [Citation Graph (0, 0)][DBLP]
    USENIX Winter, 1994, pp:79-96 [Conf]
  14. Charanjit S. Jutla, Josyula R. Rao
    A Methodology for Designing Proof Rules for Fair Parallel Programs. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1997, v:9, n:4, pp:359-378 [Journal]
  15. Josyula R. Rao
    On the role of formal methods in security. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:77, n:2-4, pp:209-212 [Journal]
  16. Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao
    A Flexible Security System for Using Internet Content. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1997, v:14, n:5, pp:52-59 [Journal]
  17. Josyula R. Rao
    Reasoning about Probabilistic Parallel Programs. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1994, v:16, n:3, pp:798-842 [Journal]

  18. Designing a Side Channel Resistant Random Number Generator. [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002