Mahesh Tripunitara
Orcid: 0000-0002-3615-9393Affiliations:
- The University of Waterloo, Waterloo, ON, Canada
According to our database1,
Mahesh Tripunitara
authored at least 67 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Minimizing the Number of Roles in Bottom-Up Role-Mining using Maximal Biclique Enumeration.
CoRR, 2024
Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications.
Proceedings of the Information Systems Security - 20th International Conference, 2024
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
2022
The Secrecy Resilience of Access Control Policies and Its Application to Role Mining.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
2021
Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies.
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the Emerging Information Security and Applications, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
A computational complexity analysis of tunable type inference for Generic Universe Types.
Theor. Comput. Sci., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Comput. Secur., 2019
Proceedings of the International Conference on Computer-Aided Design, 2019
2017
CoRR, 2017
Logic Locking for Secure Outsourced Chip Fabrication: A New Attack and Provably Secure Defense Mechanism.
CoRR, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017
Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF).
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way).
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
2015
Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 19th International Conference on Principles of Distributed Systems, 2015
Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys.
IEEE Trans. Parallel Distributed Syst., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies.
ACM Trans. Inf. Syst. Secur., 2013
IEEE Trans. Dependable Secur. Comput., 2013
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC).
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 49th Annual Design Automation Conference 2012, 2012
2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC).
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
2009
Efficient access enforcement in distributed role-based access control (RBAC) deployments.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
IEEE Trans. Dependable Secur. Comput., 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
J. Comput. Secur., 2007
IACR Cryptol. ePrint Arch., 2007
2006
2005
A theory based on security analysis for comparing the expressive power of access control models
PhD thesis, 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2001
1999
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999