Naveen Sastry

According to our database1, Naveen Sastry authored at least 11 papers between 2003 and 2008.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Verifiable functional purity in java.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2006
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine.
IACR Cryptol. ePrint Arch., 2006

Designing Voting Machines for Verification.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

2005
Cryptographic Voting Protocols: A Systems Perspective.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

Design and implementation of a sensor network system for vehicle tracking and autonomous interception.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005

2004
Security considerations for IEEE 802.15.4 networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

TinySec: a link layer security architecture for wireless sensor networks.
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004

Distillation Codes and Applications to DoS Resistant Multicast Authentication.
Proceedings of the Network and Distributed System Security Symposium, 2004

2003
Secure verification of location claims.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Scrash: A System for Generating Secure Crash Information.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003


  Loading...