Follow
Mahadevan Gomathisankaran
Mahadevan Gomathisankaran
Verified email at unt.edu
Title
Cited by
Cited by
Year
HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number System
M Gomathisankaran, A Tyagi, K Namuduri
2011 45th Annual Conference on Information Sciences and Systems, 1-5, 2011
922011
Vulcan: Vulnerability assessment framework for cloud computing
P Kamongi, S Kotikela, K Kavi, M Gomathisankaran, A Singhal
2013 IEEE 7th international conference on software security and reliability …, 2013
642013
Airborne network: a cyber-physical system perspective
K Namuduri, Y Wan, M Gomathisankaran, R Pendse
Proceedings of the first ACM MobiHoc workshop on Airborne Networks and …, 2012
392012
Mobile ad hoc networks in the sky: State of the art, opportunities, and challenges
K Namuduri, Y Wan, M Gomathisankaran
Proceedings of the second ACM MobiHoc workshop on Airborne networks and …, 2013
382013
Nemesis: Automated architecture for threat modeling and risk assessment for cloud computing
P Kamongi, M Gomathisankaran, K Kavi
Proc. 6th ASE International Conference on Privacy, Security, Risk and Trust …, 2014
372014
Ontology of secure service level agreement
CY Lee, KM Kavi, RA Paul, M Gomathisankaran
2015 IEEE 16th International Symposium on High Assurance Systems Engineering …, 2015
342015
Ensure privacy and security in the process of medical image analysis
M Gomathisankaran, X Yuan, P Kamongi
2013 IEEE international conference on granular computing (GrC), 120-125, 2013
332013
Tsv: A novel energy efficient memory integrity verification scheme for embedded systems
S Nimgaonkar, M Gomathisankaran, SP Mohanty
Journal of Systems Architecture 59 (7), 400-411, 2013
192013
Maya: A novel block encryption function
M Gomathisankaran, RB Lee
International Workshop on Coding and Cryptography, 2009
182009
Architecture support for 3d obfuscation
M Gomathisankaran, A Tyagi
IEEE Transactions on Computers 55 (5), 497-507, 2006
172006
A framework for testing hardware-software security architectures
JS Dwoskin, M Gomathisankaran, YY Chen, RB Lee
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
132010
Towards data confidentiality and a vulnerability analysis framework for cloud computing
KY Oktay, M Gomathisankaran, M Kantarcioglu, S Mehrotra, A Singhal
Secure Cloud Computing, 213-238, 2014
122014
HORNS: A semi-perfectly secret homomorphic encryption system
M Gomathisankaran, K Namuduri, A Tyagi
2012 Third International Conference on Computing, Communication and …, 2012
112012
Energy efficient memory authentication mechanism in embedded systems
S Nimgaonkar, M Gomathisankaran
2011 International Symposium on Electronic System Design, 248-253, 2011
112011
Variability-aware architecture level optimization techniques for robust nanoscale chip design
SP Mohanty, M Gomathisankaran, E Kougianos
Computers & Electrical Engineering 40 (1), 168-193, 2014
102014
Ctrust: A framework for secure and trustworthy application execution in cloud computing
S Nimgaonkar, S Kotikela, M Gomathisankaran
2012 International Conference on Cyber Security, 24-31, 2012
102012
Vulnerability assessment in cloud computing
S Kotikela, K Kavi, M Gomathisankaran
Proceedings of the International Conference on Security and Management (SAM), 1, 2012
102012
WARM SRAM: a novel scheme to reduce static leakage energy in SRAM arrays
M Gomathisankaran, A Tyagi
Journal of Low Power Electronics 2 (3), 388-400, 2006
102006
Reconfigurable block encryption logic
M Gomathisankaran, A Tyagi
US Patent 8,824,672, 2014
82014
A methodology for ranking cloud system vulnerabilities
P Kamongi, S Kotikela, M Gomathisankaran, K Kavi
2013 Fourth International Conference on Computing, Communications and …, 2013
72013
The system can't perform the operation now. Try again later.
Articles 1–20