Author of the publication

Doppelganger: Better browser privacy without the bother.

, and . ACM Conference on Computer and Communications Security, page 154-167. ACM, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Shankar, Umesh
add a person with the name Shankar, Umesh
 

Other publications of authors with the same name

Cloud Data Protection for the Masses., , , and . IEEE Computer, 45 (1): 39-45 (2012)Active Mapping: Resisting NIDS Evasion without Altering Traffic., and . IEEE Symposium on Security and Privacy, page 44-61. IEEE Computer Society, (2003)PRIMA: policy-reduced integrity measurement architecture., , and . SACMAT, page 19-28. ACM, (2006)Secure verification of location claims., , and . Workshop on Wireless Security, page 1-10. ACM, (2003)Doppelganger: Better browser privacy without the bother., and . ACM Conference on Computer and Communications Security, page 154-167. ACM, (2006)Toward Automated Information-Flow Integrity Verification for Security-Critical Applications., , and . NDSS, The Internet Society, (2006)Preventing Secret Leakage from fork(): Securing Privilege-Separated Applications., and . ICC, page 2268-2275. IEEE, (2006)Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay., , , , , and . RAID, volume 2516 of Lecture Notes in Computer Science, page 17-35. Springer, (2002)Detecting Format String Vulnerabilities with Type Qualifiers., , , and . USENIX Security Symposium, USENIX, (2001)Side Effects Are Not Sufficient to Authenticate Software., , and . USENIX Security Symposium, page 89-102. USENIX, (2004)