Online defect prediction for imbalanced data M Tan, L Tan, S Dara, C Mayeux 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015 | 343 | 2015 |
Cumulative schemes for network path proof of transit VKS Dara, SS Bhandari, A Yourtchenko, E Vyncke, F Brockners US Patent 10,187,209, 2019 | 33 | 2019 |
FNR: Arbitrary length small domain block cipher proposal S Dara, S Fluhrer Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014 | 23 | 2014 |
Network path proof of transit using in-band metadata VKS Dara, SS Bhandari, A Yourtchenko, E Vyncke, F Brockners US Patent 10,237,068, 2019 | 20 | 2019 |
Cryptography challenges for computational privacyin public clouds S Dara 2013 IEEE International Conference on Cloud Computing in Emerging Markets …, 2013 | 18 | 2013 |
Transport mechanism for carrying in-band metadata for network path proof of transit VKS Dara, SS Bhandari, A Yourtchenko, E Vyncke, F Brockners US Patent 10,211,987, 2019 | 17 | 2019 |
Secure access for encrypted data NR Leavy, VKS Dara US Patent 9,246,676, 2016 | 17 | 2016 |
Efficient format preserving encrypted databases P Chandrashekar, S Dara, VN Muralidhara 2015 IEEE International Conference on Electronics, Computing and …, 2015 | 16 | 2015 |
Towards privacy preserving threat intelligence Sashank Dara, Saman Taghavi Zargar, VN Muralidharad Journal of Information Security and Applications 38, 28-39, 2018 | 13 | 2018 |
Privacy Patterns in Public Clouds S Dara Proceedings of the Indian Conference on Pattern Languages of Programs (GuruPLoP), 2014 | 9 | 2014 |
Experiments in encrypted and searchable network audit logs BP Gopularam, S Dara, N Niranjan 2015 International Conference on Emerging Information Technology and …, 2015 | 6 | 2015 |
Network telemetry anonymization for cloud based security analysis-best practices S Dara 2014 IEEE International Conference on Cloud Computing in Emerging Markets …, 2014 | 6 | 2014 |
Privacy preserving architectures for collaborative intrusion detection S Dara, VN Muralidhara arXiv preprint arXiv:1602.02452, 2016 | 5 | 2016 |
Experimental evaluation of network telemetry anonymization for cloud based security analysis S Dara, BP Gopularam, VN Muralidhara, N Nalini 2015 IEEE International Conference on Cloud Computing in Emerging Markets …, 2015 | 2 | 2015 |
Feasibility Study of Port Scan Detection on Encrypted Data P Chandrashekar, S Dara, VN Muralidhara 2015 IEEE International Conference on Cloud Computing in Emerging Markets …, 2015 | 2 | 2015 |
Efficient format preserving encrypted databases C Prakruti, S Dara, VN Muralidhara Cryptology ePrint Archive, 2015 | 2 | 2015 |
Multi-user protocols with access control for computational privacy in public clouds S Dara arXiv preprint arXiv:1406.1823, 2014 | 2 | 2014 |
Advanced searchable encryption over well defined strings S Dara Emerging Research in Computing, Information, Communication and Applications, 2014 | 1 | 2014 |
Similarity Based Interactive Private Information Retrieval S Dara, VN Muralidhara Security, Privacy, and Applied Cryptography Engineering: 7th International …, 2017 | | 2017 |
Feasibility study of botnet detection on encrypted data P Chandrashekar, S Dara, VN Muralidhara 2016 IEEE Annual India Conference (INDICON), 1-3, 2016 | | 2016 |