Mahesh V. Tripunitara
According to our database1,
Mahesh V. Tripunitara
authored at least 32 papers
between 1999 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Proceedings of the International Conference on Computer-Aided Design, 2019
2016
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way).
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
2015
Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC).
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 49th Annual Design Automation Conference 2012, 2012
2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC).
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
2009
Efficient access enforcement in distributed role-based access control (RBAC) deployments.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
A theory based on security analysis for comparing the expressive power of access control models
PhD thesis, 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
1999
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999