Mahadevan Gomathisankaran

According to our database1, Mahadevan Gomathisankaran authored at least 24 papers between 2005 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Optimus: Framework of Vulnerabilities, Attacks, Defenses and SLA Ontologies.
Int. J. Next Gener. Comput., 2015

Ontology of Secure Service Level Agreement.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

2014
Variability-aware architecture level optimization techniques for robust nanoscale chip design.
Comput. Electr. Eng., 2014

Glitch Resistant Private Circuits Design Using HORNS.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014

2013
TSV: A novel energy efficient Memory Integrity Verification scheme for embedded systems.
J. Syst. Archit., 2013

MEM-DnP - A Novel Energy Efficient Approach for Memory Integrity Detection and Protection in Embedded Systems.
Circuits Syst. Signal Process., 2013

VULCAN: Vulnerability Assessment Framework for Cloud Computing.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Mobile ad hoc networks in the sky: state of the art, opportunities, and challenges.
Proceedings of the second ACM MobiHoc workshop on Airborne networks and communications, 2013

Ensure privacy and security in the process of medical image analysis.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2012
The Chief Security Officer Problem
CoRR, 2012

A Novel Design of Secure and Private Circuits.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2012

CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Energy Efficient Memory Authentication Mechanism in Embedded Systems.
Proceedings of the International Symposium on Electronic System Design, 2011

HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number System.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

2010
Power, performance and security optimized hardware design for H.264.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

A framework for testing hardware-software security architectures.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Relating Boolean gate truth tables to one-way functions.
Integr. Comput. Aided Eng., 2009

Tantra: A Fast PRNG Algorithm and its Implementation.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
REBEL - Reconfigurable Block Encryption Logic.
Proceedings of the SECRYPT 2008, 2008

2006
Architecture Support for 3D Obfuscation.
IEEE Trans. Computers, 2006

WARM SRAM: A Novel Scheme to Reduce Static Leakage Energy in SRAM Arrays.
J. Low Power Electron., 2006

2005
Arc3D: A 3D Obfuscation Architecture.
Proceedings of the High Performance Embedded Architectures and Compilers, 2005

TIVA: Trusted Integrity Verification Architecture.
Proceedings of the Digital Rights Management: Technologies, 2005


  Loading...