Min-max fair power flow tracing for transmission system usage cost allocation: A large system perspective MSS Rao, SA Soman, P Chitkara, RK Gajbhiye, N Hemachandra, ... IEEE Transactions on Power Systems 25 (3), 1457-1468, 2010 | 83 | 2010 |
Network security and cryptography BL Menezes Wadsworth Publishing Company Incorporated, 2012 | 55 | 2012 |
Security issues in mobile payment systems S Agarwal, M Khapra, B Menezes, N Uchat Computer Society of India, 142-152, 2007 | 53 | 2007 |
Highly efficient algorithms for AES key retrieval in cache access attacks C Ashokkumar, RP Giri, B Menezes 2016 IEEE European symposium on security and privacy (EuroS&P), 261-275, 2016 | 44 | 2016 |
An expert system approach to short-term load forecasting for Reliance Energy Limited, Mumbai MSS Rao, SA Soman, BL Menezes, P Chawande, P Dipti, T Ghanshyam 2006 IEEE Power India Conference, 6 pp., 2006 | 41 | 2006 |
Two for the price of one: A combined browser defense against XSS and clickjacking KS Rao, N Jain, N Limaje, A Gupta, M Jain, B Menezes 2016 International Conference on Computing, Networking and Communications …, 2016 | 25 | 2016 |
New bounds on the reliability of augmented shuffle-exchange networks BL Menezes, U Bakhru IEEE transactions on computers 44 (1), 123-129, 1995 | 23 | 1995 |
Challenges in RFID deployment–a case study in public transportation B Menezes, K Laddhad, KB KReSIT, K Dutta ICEG 2006: The 4th International Conference on E-Governance, Delhi, India 1 …, 2006 | 21 | 2006 |
" S-Box" Implementation of AES is NOT side-channel resistant C Ashokkumar, B Roy, MBS Venkatesh, BL Menezes Cryptology ePrint Archive, 2018 | 16 | 2018 |
The performance of crossbar-based binary hypercubes FT Hady, BL Menezes IEEE transactions on computers 44 (10), 1208-1215, 1995 | 15 | 1995 |
The KYKLOS multicomputer network: Interconnection strategies, properties, and applications BL Menezes, R Jenevein IEEE Transactions on Computers 40 (06), 693-705, 1991 | 15 | 1991 |
KYKLOS: A Linear Growth Fault-Tolerant Interconnection Network. BL Menezes, RM Jenevein ICPP, 498-502, 1985 | 15 | 1985 |
Database Access Control for E-Business–A case study S Dwivedi, B Menezes, A Singh Proc. Int. Conf. on Management of Data, 168-175, 2005 | 14 | 2005 |
Design and implementation of an espionage network for cache-based side channel attacks on AES B Roy, RP Giri, C Ashokkumar, B Menezes 2015 12th International Joint Conference on e-Business and …, 2015 | 12 | 2015 |
Implementing side-channel attacks on suggest boxes in web applications SA Sharma, BL Menezes Proceedings of the First International Conference on Security of Internet of …, 2012 | 12 | 2012 |
Design of a HyperKYKLOS-based multiprocessor architecture for high-performance join operations BL Menezes, K Thadani, AG Dale, R Jenevein DataBase Machines and Knowledge Base Machines, 75-88, 1988 | 9 | 1988 |
KYKLOS: Low Tide High Flow. RM Jenevein, BL Menezes ICDCS, 8-15, 1986 | 9 | 1986 |
DSA signing key recovery with noisy side channels and variable error rates J Angel, R Rahul, C Ashokkumar, B Menezes International Conference on Cryptology in India, 147-165, 2017 | 7 | 2017 |
An error-tolerant approach for efficient AES key retrieval in the presence of cacheprefetching–experiments, results, analysis C Ashokkumar, MBS Venkatesh, RP Giri, B Roy, B Menezes Sādhanā 44, 1-18, 2019 | 6 | 2019 |
Reliability Analysis of the KYKLOS Interconnection Network. BL Menezes, RM Jenevein, M Malek ICDCS, 46-53, 1986 | 6 | 1986 |