HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number System M Gomathisankaran, A Tyagi, K Namuduri 2011 45th Annual Conference on Information Sciences and Systems, 1-5, 2011 | 96 | 2011 |
Vulcan: Vulnerability assessment framework for cloud computing P Kamongi, S Kotikela, K Kavi, M Gomathisankaran, A Singhal 2013 IEEE 7th international conference on software security and reliability …, 2013 | 67 | 2013 |
Mobile ad hoc networks in the sky: State of the art, opportunities, and challenges K Namuduri, Y Wan, M Gomathisankaran Proceedings of the second ACM MobiHoc workshop on Airborne networks and …, 2013 | 40 | 2013 |
Airborne network: a cyber-physical system perspective K Namuduri, Y Wan, M Gomathisankaran, R Pendse Proceedings of the first ACM MobiHoc workshop on Airborne Networks and …, 2012 | 38 | 2012 |
Nemesis: Automated architecture for threat modeling and risk assessment for cloud computing P Kamongi, M Gomathisankaran, K Kavi Proc. 6th ASE International Conference on Privacy, Security, Risk and Trust …, 2014 | 36 | 2014 |
Ontology of secure service level agreement CY Lee, KM Kavi, RA Paul, M Gomathisankaran 2015 IEEE 16th International Symposium on High Assurance Systems Engineering …, 2015 | 34 | 2015 |
Ensure privacy and security in the process of medical image analysis M Gomathisankaran, X Yuan, P Kamongi 2013 IEEE international conference on granular computing (GrC), 120-125, 2013 | 34 | 2013 |
Tsv: A novel energy efficient memory integrity verification scheme for embedded systems S Nimgaonkar, M Gomathisankaran, SP Mohanty Journal of Systems Architecture 59 (7), 400-411, 2013 | 19 | 2013 |
Maya: A novel block encryption function M Gomathisankaran, RB Lee International Workshop on Coding and Cryptography, 2009 | 18 | 2009 |
Architecture support for 3d obfuscation M Gomathisankaran, A Tyagi IEEE Transactions on Computers 55 (5), 497-507, 2006 | 17 | 2006 |
A framework for testing hardware-software security architectures JS Dwoskin, M Gomathisankaran, YY Chen, RB Lee Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 14 | 2010 |
Towards data confidentiality and a vulnerability analysis framework for cloud computing KY Oktay, M Gomathisankaran, M Kantarcioglu, S Mehrotra, A Singhal Secure Cloud Computing, 213-238, 2014 | 12 | 2014 |
Variability-aware architecture level optimization techniques for robust nanoscale chip design SP Mohanty, M Gomathisankaran, E Kougianos Computers & Electrical Engineering 40 (1), 168-193, 2014 | 11 | 2014 |
HORNS: A semi-perfectly secret homomorphic encryption system M Gomathisankaran, K Namuduri, A Tyagi 2012 Third International Conference on Computing, Communication and …, 2012 | 11 | 2012 |
Vulnerability assessment in cloud computing S Kotikela, K Kavi, M Gomathisankaran Proceedings of the International Conference on Security and Management (SAM), 1, 2012 | 11 | 2012 |
Energy efficient memory authentication mechanism in embedded systems S Nimgaonkar, M Gomathisankaran 2011 International Symposium on Electronic System Design, 248-253, 2011 | 11 | 2011 |
Ctrust: A framework for secure and trustworthy application execution in cloud computing S Nimgaonkar, S Kotikela, M Gomathisankaran 2012 International Conference on Cyber Security, 24-31, 2012 | 10 | 2012 |
WARM SRAM: a novel scheme to reduce static leakage energy in SRAM arrays M Gomathisankaran, A Tyagi Journal of Low Power Electronics 2 (3), 388-400, 2006 | 10 | 2006 |
Reconfigurable block encryption logic M Gomathisankaran, A Tyagi US Patent 8,824,672, 2014 | 8 | 2014 |
A methodology for ranking cloud system vulnerabilities P Kamongi, S Kotikela, M Gomathisankaran, K Kavi 2013 Fourth International Conference on Computing, Communications and …, 2013 | 7 | 2013 |