Search

Your search keyword '"Gauravaram, Praveen"' showing total 195 results

Search Constraints

Start Over You searched for: Author "Gauravaram, Praveen" Remove constraint Author: "Gauravaram, Praveen"
195 results on '"Gauravaram, Praveen"'

Search Results

1. Double-Signed Fragmented DNSSEC for Countering Quantum Threat

2. AI-Compass: A Comprehensive and Effective Multi-module Testing Tool for AI Systems

3. A Graph-Based Approach for Software Functionality Classification on the Web

4. A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies

6. Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

7. Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures

8. A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments

11. LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy

13. Vulnerability Database as a Service for IoT

14. Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

15. Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution

18. Security Analysis of a Design Variant of Randomized Hashing

21. Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis

22. Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48

23. Cryptanalysis of SIMON Variants with Connections

26. Improved Security Analysis of Fugue-256 (Poster)

28. On the Collision and Preimage Resistance of Certain Two-Call Hash Functions

29. Cryptanalysis of Tav-128 Hash Function

30. Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512

32. Cryptanalysis of the LAKE Hash Family

33. On Randomizing Hash Functions to Strengthen the Security of Digital Signatures

34. Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements

35. Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks

36. An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions

37. Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction

38. BloomXNOR-Net

46. Cryptanalysis of SIMON Variants with Connections

48. The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports

Catalog

Books, media, physical & digital resources