Patel , Ananthanarayanan , Rajendiran , Garg
design automation conference 697 -702
M.V. Tripunitara , P. Dutta
annual computer security applications conference 303 -309
Ninghui Li , M.V. Tripunitara
ieee symposium on security and privacy 96 -109
S. Jha , Ninghui Li , M. Tripunitara , Qihua Wang
IEEE Transactions on Dependable and Secure Computing 5 ( 4) 242 -255
Ninghui Li , Mahesh Tripunitara
annual information security symposium 23
Frank Imeson , Siddharth Garg , Mahesh Tripunitara , Saeed Nejati
WOOT'16 Proceedings of the 10th USENIX Conference on Offensive Technologies 118 -129
Siddharth Garg , Mahesh Tripunitara , Mohamed El Massad
international conference on computer aided design 33 -40
Mohamed El Massad , Frank Imeson , Siddharth Garg , Mahesh Tripunitara
great lakes symposium on vlsi 333 -338
Karthick Jayaraman , Vijay Ganesh , Mahesh Tripunitara , Martin Rinard
Proceedings of the 18th ACM conference on Computer and communications security - CCS '11 163 -174
Bogdan Carbunar , Mahesh Tripunitara
sensor mesh and ad hoc communications and networks 1 -9
Ahmad Saif Ur Rehman , Augusto Born de Oliveira , Mahesh Tripunitara , Sebastian Fischmeister
Software - Practice and Experience 44 ( 12) 1511 -1523
Zhiyuan Lin , Mahesh Tripunitara
conference on data and application security and privacy 337 -348
Mohamed El Massad , Siddharth Garg , Mahesh Tripunitara
network and distributed system security symposium
Nahid Juma , Werner Dietl , Mahesh Tripunitara
Theoretical Computer Science 814 189 -209
Doug Kuhlman , Ryan Moriarty , Tony Braskich , Steve Emeott
ieee computer security foundations symposium 315 -330
Bogdan Carbunar , Mahesh Tripunitara
cryptology and network security 317 -331
Marko Komlenovic , Mahesh Tripunitara , Toufik Zitouni
Proceedings of the first ACM conference on Data and application security and privacy - CODASPY '11 121 -132
Nima Mousavi , Mahesh Tripunitara
Computers & Security 81 1 -14
Nima Mousavi , Mahesh Tripunitara
symposium on access control models and technologies 161 -164