Sreekanth Malladi

According to our database1, Sreekanth Malladi authored at least 10 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Adapting Constraint Solving to Automatically Analyze UPI Protocols.
Proceedings of the Protocols, Strands, and Logic, 2021

2012
Analyzing Workflows in Business Processes for Obstructions due to Authorization Policies.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-OR.
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011

2010
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
CoRR, 2010

Disabling equational theories in unification for cryptographic protocol analysis through tagging
CoRR, 2010

How to prevent type-flaw attacks on security protocols under algebraic properties
CoRR, 2010

Protocol indepedence through disjoint encryption under Exclusive-OR
CoRR, 2010

Automatic analysis of distance bounding protocols
CoRR, 2010

2008
What is the best way to prove a cryptographic protocol correct?
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2002
What are Multi-Protocol Guessing Attacks and How to Prevent Them.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002


  Loading...