default search action
N. V. Narendra Kumar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j2]N. Satya Krishna, S. Nagesh Bhattu, Durvasula V. L. N. Somayajulu, N. V. Narendra Kumar, K. Jaya Shankar Reddy:
GssMILP for anomaly classification in surveillance videos. Expert Syst. Appl. 203: 117451 (2022) - [c25]Neha Joshi, Rishabh Kumar, Abhishek Thakur, A. Antony Franklin, N. V. Narendra Kumar:
PPAS: Privacy-preserving Resource Discovery for Multi-domain SFC orchestration. ICCCN 2022: 1-7 - [c24]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes. ICISS 2022: 84-102 - 2021
- [c23]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
Towards Unifying RBAC with Information Flow Control. SACMAT 2021: 45-54 - 2020
- [j1]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar, Parjanya Vyas:
Consistency analysis and flow secure enforcement of SELinux policies. Comput. Secur. 94: 101816 (2020)
2010 – 2019
- 2019
- [c22]Nagesh Bhattu Sristy, Satya Krishna Nunna, Durvasula V. L. N. Somayajulu, N. V. Narendra Kumar:
Convex vs Convex-Concave Objective for Rare Label Classification. MIKE 2019: 42-51 - [c21]Prashanth Kadari, Avinash Potluri, Nagesh Bhattu Sristy, R. B. V. Subramanyam, N. V. Narendra Kumar:
Skew Aware Partitioning Techniques for Multi-way Spatial Join. MIKE 2019: 52-61 - [e1]Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar:
Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings. Lecture Notes in Computer Science 11952, Springer 2019, ISBN 978-3-030-36944-6 [contents] - 2018
- [c20]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies. DBSec 2018: 219-231 - [c19]Khedkar Shrikrishna, N. V. Narendra Kumar, R. K. Shyamasundar:
Security Analysis of EMV Protocol and Approaches for Strengthening It. ICDCIT 2018: 69-85 - [c18]Shashank Khobragade, N. V. Narendra Kumar, R. K. Shyamasundar:
Secure Synthesis of IoT via Readers-Writers Flow Model. ICDCIT 2018: 86-104 - [c17]Sandip Ghosal, R. K. Shyamasundar, N. V. Narendra Kumar:
Static Security Certification of Programs via Dynamic Labelling. ICETE (2) 2018: 400-411 - [c16]N. V. Narendra Kumar, R. K. Shyamasundar:
A Semantic Notion of Secure Information-Flow. ISEA-ISAP 2018: 35-52 - [c15]Rudrapatna K. Shyamasundar, N. V. Narendra Kumar, Abhijit Taware, Parjanya Vyas:
An Experimental Flow Secure File System. TrustCom/BigDataSE 2018: 790-799 - 2017
- [c14]N. V. Narendra Kumar, R. K. Shyamasundar:
Analyzing Protocol Security Through Information-Flow Control. ICDCIT 2017: 159-171 - [c13]N. V. Narendra Kumar, R. K. Shyamasundar:
Dynamic Labelling to Enforce Conformance of Cross Domain Security/Privacy Policies. ICDCIT 2017: 183-195 - [c12]R. K. Shyamasundar, N. V. Narendra Kumar, Priyanka Teltumde:
Realizing software vault on Android through information-flow control. ISCC 2017: 1007-1014 - [c11]N. V. Narendra Kumar, R. K. Shyamasundar:
A Complete Generative Label Model for Lattice-Based Access Control Models. SEFM 2017: 35-53 - 2016
- [c10]R. K. Shyamasundar, N. V. Narendra Kumar, Muttukrishnan Rajarajan:
Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds. HPCC/SmartCity/DSS 2016: 1410-1417 - [c9]N. V. Narendra Kumar, R. K. Shyamasundar:
An End-to-End Privacy Preserving Design of a Map-Reduce Framework. HPCC/SmartCity/DSS 2016: 1469-1476 - 2015
- [c8]N. V. Narendra Kumar, R. K. Shyamasundar:
POSTER: Dynamic Labelling for Analyzing Security Protocols. CCS 2015: 1665-1667 - [c7]S. Susheel, N. V. Narendra Kumar, R. K. Shyamasundar:
Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control. ICISS 2015: 551-561 - [c6]N. V. Narendra Kumar, R. K. Shyamasundar:
Labelled mobile ambients model for information flow security in distributed systems. SIN 2015: 330-337 - 2014
- [c5]N. V. Narendra Kumar, R. K. Shyamasundar:
Realizing Purpose-Based Privacy Policies Succinctly via Information-Flow Labels. BDCloud 2014: 753-760 - 2011
- [c4]Nihita Goel, N. V. Narendra Kumar, R. K. Shyamasundar:
SLA Monitor: A System for Dynamic Monitoring of Adaptive Web Services. ECOWS 2011: 109-116 - [p1]N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar:
Towards Checking Tampering of Software. Cyber Security, Cyber Crime and Cyber Forensics 2011: 204-219 - 2010
- [c3]R. K. Shyamasundar, Harshit J. Shah, N. V. Narendra Kumar:
Malware: From Modelling to Practical Detection. ICDCIT 2010: 21-39 - [c2]N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar:
Can we certify systems for freedom from malware. ICSE (2) 2010: 175-178
2000 – 2009
- 2006
- [c1]N. V. Narendra Kumar, R. K. Shyamasundar:
Specification and Realization of Access Control in SPKI/SDSI. ICISS 2006: 177-193
Coauthor Index
aka: Rudrapatna K. Shyamasundar
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint