Seguir
Josyula Ramachandra Rao
Josyula Ramachandra Rao
IBM Research
Dirección de correo verificada de us.ibm.com - Página principal
Título
Citado por
Citado por
Año
Template attacks
S Chari, JR Rao, P Rohatgi
Cryptographic hardware and embedded systems-CHES 2002: 4th International …, 2003
19302003
Towards sound approaches to counteract power-analysis attacks
S Chari, CS Jutla, JR Rao, P Rohatgi
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
14381999
The EM side—channel (s)
D Agrawal, B Archambeault, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
12922003
A survey of security issues in multicast communications
MJ Moyer, JR Rao, P Rohatgi
IEEE network 13 (6), 12-23, 1999
3171999
A cautionary note regarding evaluation of AES candidates on smart-cards
S Chari, C Jutla, JR Rao, P Rohatgi
Second Advanced Encryption Standard Candidate Conference, 133-147, 1999
2631999
Multi-channel attacks
D Agrawal, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
2062003
Can pseudonymity really guarantee privacy?
JR Rao, P Rohatgi
9th USENIX Security Symposium (USENIX Security 00), 2000
2012000
Partitioning attacks: or how to rapidly clone some GSM cards
JR Rao, P Rohatgi, H Scherzer, S Tinguely
Proceedings 2002 IEEE Symposium on Security and Privacy, 31-41, 2002
1562002
Adaptive cyber-security analytics
L Amini, M Christodorescu, MA Cohen, S Parthasarathy, J Rao, R Sailer, ...
US Patent 9,032,521, 2015
1492015
Detecting malicious user activity
SN Chari, TA Habeck, IM Molloy, Y Park, JR Rao, W Teiken
US Patent 10,599,837, 2020
1332020
Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure
S Berger, Y Chen, X Hu, D Pendarakis, J Rao, R Sailer, DL Schales, ...
US Patent 9,832,217, 2017
1322017
Maintaining balanced key trees for secure multicast
MJ Moyer
IRTF Internet Draft, 1999
1111999
Intrusion detection system
S Chari, PC Cheng, J Rao, P Rohatgi, M Steiner
US Patent App. 11/037,695, 2006
1042006
Security for the cloud infrastructure: Trusted virtual data center implementation
S Berger, R Cáceres, K Goldman, D Pendarakis, R Perez, JR Rao, E Rom, ...
IBM Journal of Research and Development 53 (4), 6: 1-6: 12, 2009
1002009
Systems, methods and computer programs providing impact mitigation of cyber-security failures
Y Drissi, IIRA Hamilton, CG Harrison, JL Kouloheris, PC Pattnaik, JR Rao, ...
US Patent 9,129,108, 2015
932015
Templates as master keys
D Agrawal, JR Rao, P Rohatgi, K Schramm
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
842005
Efficient implementation of Rijndael encryption with composite field arithmetic
A Rudra, PK Dubey, CS Jutla, V Kumar, JR Rao, P Rohatgi
Proc. CHES 2001 2162, 175-188, 2001
832001
System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values
SC Gates, Y Park, JR Rao, W Teiken
US Patent 8,560,722, 2013
802013
Empowering side-channel attacks
JR Rao, P Rohatgi
Cryptology EPrint Archive, 2001
782001
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
692018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20