Tagging makes secrecy decidable with unbounded nonces as well R Ramanujam, SP Suresh International Conference on Foundations of Software Technology and …, 2003 | 80 | 2003 |
Knowledge-based modelling of voting protocols A Baskar, R Ramanujam, SP Suresh Proceedings of the 11th conference on Theoretical aspects of rationality and …, 2007 | 76 | 2007 |
Synthesis of Co3O4 nanoparticles with block and sphere morphology, and investigation into the influence of morphology on biological toxicity V Raman, S Suresh, PA Savarimuthu, T Raman, AM Tsatsakis, ... Experimental and therapeutic medicine 11 (2), 553-560, 2016 | 61 | 2016 |
Decidability of context-explicit security protocols R Ramanujam, SP Suresh Journal of Computer Security 13 (1), 135-165, 2005 | 54 | 2005 |
A decidable subclass of unbounded security protocols R Ramanujam, SP Suresh Proc. IFIP Workshop on Issues in the Theory of Security (WITS’03), 11-20, 2003 | 40 | 2003 |
Generic verification of security protocols AS Khan, M Mukund, SP Suresh Model Checking Software: 12th International SPIN Workshop, San Francisco, CA …, 2005 | 25 | 2005 |
Deciding knowledge properties of security protocols R Ramanujam, SP Suresh Proceedings of the 10th conference on Theoretical aspects of rationality and …, 2005 | 22 | 2005 |
Optimized or-sets without ordering constraints M Mukund, G Shenoy R, SP Suresh Distributed Computing and Networking: 15th International Conference, ICDCN …, 2014 | 21 | 2014 |
A dexptime-Complete Dolev-Yao Theory with Distributive Encryption A Baskar, R Ramanujam, SP Suresh International Symposium on Mathematical Foundations of Computer Science, 102-113, 2010 | 15 | 2010 |
Undecidability of secrecy for security protocols R Ramanujam, SP Suresh manuscript, July 200 (3), 2003 | 15 | 2003 |
Information based reasoning about security protocols R Ramanujam, SP Suresh Electronic Notes in Theoretical Computer Science 55 (1), 85-100, 2003 | 13 | 2003 |
Extending dolev-yao with assertions R Ramanujam, V Sundararajan, SP Suresh International Conference on Information Systems Security, 50-68, 2014 | 12 | 2014 |
Foundations of security protocol analysis SP Suresh University of Madras, 2009 | 10 | 2009 |
Formalizing and checking multilevel consistency A Bouajjani, C Enea, M Mukund, G Shenoy R, SP Suresh Verification, Model Checking, and Abstract Interpretation: 21st …, 2020 | 7 | 2020 |
A dolev-yao model for zero knowledge A Baskar, R Ramanujam, SP Suresh Advances in Computer Science-ASIAN 2009. Information Security and Privacy …, 2009 | 7 | 2009 |
A (restricted) quantifier elimination for security protocols R Ramanujam, SP Suresh Theoretical Computer Science 367 (1-2), 228-256, 2006 | 7 | 2006 |
An equivalence on terms for security protocols R Ramanujam, SP Suresh Proceedings of AVIS 3, 45-56, 2003 | 7 | 2003 |
Primal infon logic: derivability in polynomial time A Baskar, P Naldurg, KR Raghavendra, SP Suresh IARCS Annual Conference on Foundations of Software Technology and …, 2013 | 6 | 2013 |
Existential assertions for voting protocols R Ramanujam, V Sundararajan, SP Suresh Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 4 | 2017 |
Dolev-Yao theory with associative blindpair operators A Baskar, R Ramanujam, SP Suresh Implementation and Application of Automata: 24th International Conference …, 2019 | 3 | 2019 |