Search the dblp DataBase
Suresh Chari :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Suresh Chari , Josyula R. Rao , Pankaj Rohatgi Template Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2002, pp:13-28 [Conf ] Juris Hartmanis , Suresh Chari On the Intellectual Terrain Around NP. [Citation Graph (0, 0)][DBLP ] CIAC, 1994, pp:1-11 [Conf ] Suresh Chari , Pankaj Rohatgi On Completeness under Random Reductions. [Citation Graph (0, 0)][DBLP ] Structure in Complexity Theory Conference, 1993, pp:176-184 [Conf ] Suresh Chari , Charanjit S. Jutla , Josyula R. Rao , Pankaj Rohatgi Towards Sound Approaches to Counteract Power-Analysis Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:398-412 [Conf ] Suresh Chari , Parviz Kermani , Sean Smith , Leandros Tassiulas Security Issues in M-Commerce: A Usage-Based Taxonomy. [Citation Graph (0, 0)][DBLP ] E-Commerce Agents, 2001, pp:264-282 [Conf ] James Giles , Reiner Sailer , Dinesh C. Verma , Suresh Chari Authentication for Distributed Web Caches. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:126-145 [Conf ] Desh Ranjan , Suresh Chari , Pankaj Rohatgi Improving Known Solutions is Hard. [Citation Graph (0, 0)][DBLP ] ICALP, 1991, pp:381-392 [Conf ] Suresh Chari , Desh Ranjan , Pankaj Rohatgi On the Complexity of Incremental Computation. [Citation Graph (0, 0)][DBLP ] MFCS, 1992, pp:172-180 [Conf ] Suresh Chari , Pau-Chen Cheng BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] NDSS, 2002, pp:- [Conf ] Suresh Chari , Pankaj Rohatgi , Aravind Srinivasan Randomness-optimal unique element isolation, with applications to perfect matching and related problems. [Citation Graph (0, 0)][DBLP ] STOC, 1993, pp:458-467 [Conf ] Suresh Chari , Pankaj Rohatgi , Aravind Srinivasan Improved algorithms via approximations of probability distributions (extended abstract). [Citation Graph (0, 0)][DBLP ] STOC, 1994, pp:584-592 [Conf ] Desh Ranjan , Suresh Chari , Pankaj Rohatgi Improving Known Solutions is Hard. [Citation Graph (0, 0)][DBLP ] Computational Complexity, 1993, v:3, n:, pp:168-185 [Journal ] Richard Chang , Suresh Chari , Desh Ranjan , Pankaj Rohatgi Relativization: a revisionistic retrospective. [Citation Graph (0, 0)][DBLP ] Bulletin of the EATCS, 1992, v:47, n:, pp:144-153 [Journal ] Suresh Chari , Pankaj Rohatgi On Completeness Under Random Reductions. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1996, v:53, n:3, pp:545-555 [Journal ] Suresh Chari , Pankaj Rohatgi , Aravind Srinivasan Improved Algorithms via Approximations of Probability Distributions. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2000, v:61, n:1, pp:81-107 [Journal ] Jin-yi Cai , Suresh Chari On the Impossibility of Amplifying the Independence of Random Variables. [Citation Graph (0, 0)][DBLP ] Random Struct. Algorithms, 1995, v:7, n:4, pp:301-310 [Journal ] Suresh Chari , Pankaj Rohatgi , Aravind Srinivasan Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1995, v:24, n:5, pp:1036-1050 [Journal ] Suresh Chari , Pau-Chen Cheng BlueBoX: A policy-driven, host-based intrusion detection system. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:173-200 [Journal ] Kang-Won Lee , Suresh Chari , Anees Shaikh , Sambit Sahu , Pau-Chen Cheng Improving the resilience of content distribution networks to large scale distributed denial of service attacks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2753-2770 [Journal ] Designing a Side Channel Resistant Random Number Generator. [Citation Graph (, )][DBLP ] SMash: secure component model for cross-domain mashups on unmodified browsers. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs