Authentication and integrity in outsourced databases E Mykletun, M Narasimha, G Tsudik ACM Transactions on Storage (TOS) 2 (2), 107-138, 2006 | 536 | 2006 |
Authentication of outsourced databases using signature aggregation and chaining M Narasimha, G Tsudik International conference on database systems for advanced applications, 420-436, 2006 | 200 | 2006 |
On the utility of distributed cryptography in P2P and MANETs: the case of membership control M Narasimha, G Tsudik, JH Yi 11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003 | 167 | 2003 |
DSAC: integrity for outsourced databases with signature aggregation and chaining M Narasimha, G Tsudik Proceedings of the 14th ACM international conference on Information and …, 2005 | 128 | 2005 |
Signature bouquets: Immutability for aggregated/condensed signatures E Mykletun, M Narasimha, G Tsudik European Symposium on Research in Computer Security, 160-176, 2004 | 106 | 2004 |
Path optimization in distributed service chains in a network environment SS Patwardhan, M Narasimha, S Nellikar US Patent 9,491,094, 2016 | 87 | 2016 |
Adaptive infrastructure for distributed virtual switch S Nellikar, M Narasimha, A Mittal US Patent 9,288,162, 2016 | 65 | 2016 |
Co-operative load sharing and redundancy in distributed service chains in a network environment M Narasimha, S Nellikar, SS Patwardhan, S Sardar US Patent App. 14/037,210, 2015 | 58 | 2015 |
System and method for securing distributed exporting models in a network environment M Narasimha, S Nellikar, S Sardar US Patent 8,584,215, 2013 | 55 | 2013 |
Location independent dynamic IP address assignment A Mittal, M Narasimha, M Mehta, S Sardar US Patent App. 13/135,918, 2013 | 25 | 2013 |
Providing authentication and integrity in outsourced databases using Merkle hash trees E Mykletun, M Narasimha, G Tsudik UCI-SCONCE Technical Report, 2003 | 24 | 2003 |
Method and apparatus for supporting access control lists in a multi-tenant environment A Mittal, M Narasimha, AD Swaminathan, BM Vijayaraghavan US Patent 8,751,650, 2014 | 23 | 2014 |
System and method for efficient use of flow table space in a network environment M Narasimha, AD Swaminathan, NVKK Chunduri, S Sardar US Patent 9,548,920, 2017 | 22 | 2017 |
Secure group services for storage area networks Y Kim, F Maino, M Narasimha, G Tsudik First International IEEE Security in Storage Workshop, 2002. Proceedings., 80-93, 2002 | 19 | 2002 |
Network-assisted configuration and programming of gateways in a network environment SS Patwardhan, M Narasimha, S Ramachandran US Patent 9,559,896, 2017 | 15 | 2017 |
Secure group key management for storage area networks Y Kim, M Narasimha, G Tsudik IEEE Communications Magazine 41 (8), 92-99, 2003 | 14 | 2003 |
Method and apparatus for advanced statistics collection S Nellikar, M Narasimha US Patent 9,781,037, 2017 | 11 | 2017 |
Method and apparatus for ingress filtering S Nellikar, M Narasimha US Patent 9,380,025, 2016 | 8 | 2016 |
Privacy-preserving revocation checking M Narasimha, J Solis, G Tsudik International Journal of Information Security 8 (1), 61-75, 2009 | 8 | 2009 |
Privacy-preserving revocation checking with modified crls M Narasimha, G Tsudik European Public Key Infrastructure Workshop, 18-33, 2007 | 2 | 2007 |