Naveen Sastry
Naveen Sastry
Άγνωστη συνεργασία
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα
Παρατίθεται από
Παρατίθεται από
TinySec: a link layer security architecture for wireless sensor networks
C Karlof, N Sastry, D Wagner
Proceedings of the 2nd international conference on Embedded networked sensor …, 2004
Secure verification of location claims
N Sastry, U Shankar, D Wagner
Proceedings of the 2nd ACM workshop on Wireless security, 1-10, 2003
Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies
D Patterson, A Brown, P Broadwell, G Candea, M Chen, J Cutler, ...
Technical Report UCB//CSD-02-1175, UC Berkeley Computer Science, 2002
Security considerations for IEEE 802.15. 4 networks
N Sastry, D Wagner
Proceedings of the 3rd ACM workshop on Wireless security, 32-42, 2004
Cryptographic Voting Protocols: A Systems Perspective.
C Karlof, N Sastry, DA Wagner
USENIX Security Symposium 12, 39, 2005
Design and implementation of a sensor network system for vehicle tracking and autonomous interception.
C Sharp, S Schaffert, A Woo, N Sastry, C Karlof, S Sastry, DE Culler
EWSN, 93-107, 2005
Distillation codes and applications to DoS resistant multicast authentication
C Karlof, N Sastry, Y Li, A Perrig, JD Tygar
NDSS 4, 37-56, 2004
Scrash: A System for Generating Secure Crash Information.
P Broadwell, M Harren, N Sastry
Usenix Security Symposium, 19, 2003
FIG: A prototype tool for online verification of recovery mechanisms
P Broadwell, N Sastry, J Traupman
Workshop on Self-Healing, Adaptive and Self-Managed Systems, 2002
Verifiable functional purity in Java
M Finifter, A Mettler, N Sastry, D Wagner
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Tamper-evident, history-independent, subliminal-free data structures on prom storage-or-how to store ballots on a voting machine
D Molnar, T Kohno, N Sastry, D Wagner
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-370, 2006
Fixing Races for Fun and Profit: How to Abuse atime.
N Borisov, R Johnson, N Sastry, D Wagner
USENIX Security Symposium, 2005
TinySec: Link layer encryption for tiny devices
C Karlof, N Sastry, D Wagner
ACM SenSys, 3-5, 2004
Security analysis of the Diebold AccuBasic interpreter
D Wagner, D Jefferson, M Bishop, C Karlof, N Sastry
Designing Voting Machines for Verification.
N Sastry, T Kohno, D Wagner
USENIX Security Symposium, 2006
Source code review of the Sequoia voting system
M Blaze, A Cordero, S Engle, C Karlof, N Sastry, M Sherr, T Stegers, ...
State of California’s Top to Bottom Review 2, 2007
Energy-aware adaptive watermarking for real-time image delivery in wireless sensor networks
H Wang, D Peng, W Wang, H Sharif, HH Chen
2008 IEEE International Conference on Communications, 1479-1483, 2008
Verifying security properties in electronic voting machines
NK Sastry
University of California, Berkeley, 2007
TinySec: User Manual
C Karlof, N Sastry, D Wagner
Manuscript, September 12, 9, 2003
Security for sensor networks: Cryptography and beyond
D Wagner, C Karlof, D Molnar, N Sastry, U Shankar
URL: http://www. cs. berkeley. edu/daw/talks/SANS03. ppt, 2003
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20