Segueix
Josyula Ramachandra Rao
Josyula Ramachandra Rao
IBM Research
Correu electrònic verificat a us.ibm.com - Pàgina d'inici
Títol
Citada per
Citada per
Any
Template attacks
S Chari, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
20722003
Towards sound approaches to counteract power-analysis attacks
S Chari, CS Jutla, JR Rao, P Rohatgi
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
15451999
The EM side—channel (s)
D Agrawal, B Archambeault, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
13902003
A survey of security issues in multicast communications
MJ Moyer, JR Rao, P Rohatgi
IEEE network 13 (6), 12-23, 1999
3191999
A cautionary note regarding evaluation of AES candidates on smart-cards
S Chari, C Jutla, JR Rao, P Rohatgi
Second Advanced Encryption Standard Candidate Conference, 133-147, 1999
2641999
Multi-channel attacks
D Agrawal, JR Rao, P Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003
2122003
Can pseudonymity really guarantee privacy?
JR Rao, P Rohatgi
9th USENIX Security Symposium (USENIX Security 00), 2000
2022000
Adaptive cyber-security analytics
L Amini, M Christodorescu, MA Cohen, S Parthasarathy, J Rao, R Sailer, ...
US Patent 9,032,521, 2015
1612015
Partitioning attacks: or how to rapidly clone some GSM cards
JR Rao, P Rohatgi, H Scherzer, S Tinguely
Proceedings 2002 IEEE Symposium on Security and Privacy, 31-41, 2002
1572002
Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure
S Berger, Y Chen, X Hu, D Pendarakis, J Rao, R Sailer, DL Schales, ...
US Patent 9,832,217, 2017
1552017
Detecting malicious user activity
SN Chari, TA Habeck, IM Molloy, Y Park, JR Rao, W Teiken
US Patent 10,599,837, 2020
1432020
Systems, methods and computer programs providing impact mitigation of cyber-security failures
Y Drissi, IIRA Hamilton, CG Harrison, JL Kouloheris, PC Pattnaik, JR Rao, ...
US Patent 9,129,108, 2015
1132015
Maintaining balanced key trees for secure multicast
MJ Moyer
IRTF Internet Draft, 1999
1091999
Intrusion detection system
S Chari, PC Cheng, J Rao, P Rohatgi, M Steiner
US Patent App. 11/037,695, 2006
1052006
Security for the cloud infrastructure: Trusted virtual data center implementation
S Berger, R Cáceres, K Goldman, D Pendarakis, R Perez, JR Rao, E Rom, ...
IBM Journal of Research and Development 53 (4), 6: 1-6: 12, 2009
1022009
System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values
SC Gates, Y Park, JR Rao, W Teiken
US Patent 8,560,722, 2013
902013
Templates as master keys
D Agrawal, JR Rao, P Rohatgi, K Schramm
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
852005
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
832018
Efficient implementation of Rijndael encryption with composite field arithmetic
A Rudra, PK Dubey, CS Jutla, V Kumar, JR Rao, P Rohatgi
Proc. CHES 2001 2162, 175-188, 2001
822001
Automatic generation of data-centric attack graphs
SN Chari, A Kundu, IM Molloy, D Pendarakis, JR Rao
US Patent 10,108,803, 2018
802018
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20