The SCEAS System
| |||||||

## Search the dblp DataBase
Suresh Chari:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Suresh Chari, Josyula R. Rao, Pankaj Rohatgi
**Template Attacks.**[Citation Graph (0, 0)][DBLP] CHES, 2002, pp:13-28 [Conf] - Juris Hartmanis, Suresh Chari
**On the Intellectual Terrain Around NP.**[Citation Graph (0, 0)][DBLP] CIAC, 1994, pp:1-11 [Conf] - Suresh Chari, Pankaj Rohatgi
**On Completeness under Random Reductions.**[Citation Graph (0, 0)][DBLP] Structure in Complexity Theory Conference, 1993, pp:176-184 [Conf] - Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi
**Towards Sound Approaches to Counteract Power-Analysis Attacks.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:398-412 [Conf] - Suresh Chari, Parviz Kermani, Sean Smith, Leandros Tassiulas
**Security Issues in M-Commerce: A Usage-Based Taxonomy.**[Citation Graph (0, 0)][DBLP] E-Commerce Agents, 2001, pp:264-282 [Conf] - James Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari
**Authentication for Distributed Web Caches.**[Citation Graph (0, 0)][DBLP] ESORICS, 2002, pp:126-145 [Conf] - Desh Ranjan, Suresh Chari, Pankaj Rohatgi
**Improving Known Solutions is Hard.**[Citation Graph (0, 0)][DBLP] ICALP, 1991, pp:381-392 [Conf] - Suresh Chari, Desh Ranjan, Pankaj Rohatgi
**On the Complexity of Incremental Computation.**[Citation Graph (0, 0)][DBLP] MFCS, 1992, pp:172-180 [Conf] - Suresh Chari, Pau-Chen Cheng
**BlueBox: A Policy-Driven, Host-Based Intrusion Detection System.**[Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf] - Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan
**Randomness-optimal unique element isolation, with applications to perfect matching and related problems.**[Citation Graph (0, 0)][DBLP] STOC, 1993, pp:458-467 [Conf] - Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan
**Improved algorithms via approximations of probability distributions (extended abstract).**[Citation Graph (0, 0)][DBLP] STOC, 1994, pp:584-592 [Conf] - Desh Ranjan, Suresh Chari, Pankaj Rohatgi
**Improving Known Solutions is Hard.**[Citation Graph (0, 0)][DBLP] Computational Complexity, 1993, v:3, n:, pp:168-185 [Journal] - Richard Chang, Suresh Chari, Desh Ranjan, Pankaj Rohatgi
**Relativization: a revisionistic retrospective.**[Citation Graph (0, 0)][DBLP] Bulletin of the EATCS, 1992, v:47, n:, pp:144-153 [Journal] - Suresh Chari, Pankaj Rohatgi
**On Completeness Under Random Reductions.**[Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 1996, v:53, n:3, pp:545-555 [Journal] - Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan
**Improved Algorithms via Approximations of Probability Distributions.**[Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2000, v:61, n:1, pp:81-107 [Journal] - Jin-yi Cai, Suresh Chari
**On the Impossibility of Amplifying the Independence of Random Variables.**[Citation Graph (0, 0)][DBLP] Random Struct. Algorithms, 1995, v:7, n:4, pp:301-310 [Journal] - Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan
**Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems.**[Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1995, v:24, n:5, pp:1036-1050 [Journal] - Suresh Chari, Pau-Chen Cheng
**BlueBoX: A policy-driven, host-based intrusion detection system.**[Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:173-200 [Journal] - Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng
**Improving the resilience of content distribution networks to large scale distributed denial of service attacks.**[Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:10, pp:2753-2770 [Journal] **Designing a Side Channel Resistant Random Number Generator.**[Citation Graph (, )][DBLP]**SMash: secure component model for cross-domain mashups on unmodified browsers.**[Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |