Author of the publication

Scrash: A System for Generating Secure Crash Information.

, , and . USENIX Security Symposium, USENIX Association, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sastry, Naveen
add a person with the name Sastry, Naveen
 

Other publications of authors with the same name

Design and implementation of a sensor network system for vehicle tracking and autonomous interception., , , , , , and . EWSN, page 93-107. IEEE, (2005)Security considerations for IEEE 802.15.4 networks., and . Workshop on Wireless Security, page 32-42. ACM, (2004)Secure verification of location claims., , and . Workshop on Wireless Security, page 1-10. ACM, (2003)Verifiable functional purity in java., , , and . ACM Conference on Computer and Communications Security, page 161-174. ACM, (2008)Designing Voting Machines for Verification.. USENIX Security Symposium, USENIX Association, (2006)Distillation Codes and Applications to DoS Resistant Multicast Authentication., , , , and . NDSS, The Internet Society, (2004)TinySec: a link layer security architecture for wireless sensor networks., , and . SenSys, page 162-175. ACM, (2004)Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract)., , , and . IEEE Symposium on Security and Privacy, page 365-370. IEEE Computer Society, (2006)Scrash: A System for Generating Secure Crash Information., , and . USENIX Security Symposium, USENIX Association, (2003)Cryptographic Voting Protocols: A Systems Perspective., , and . USENIX Security Symposium, USENIX Association, (2005)