ParentsSign in to add mentor
ChildrenSign in to add trainee
CollaboratorsSign in to add collaborator
BETA: Related publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.
|Malladi S, Hura GS. (2008) What is the best way to prove a cryptographic protocol correct? Ipdps Miami 2008 - Proceedings of the 22nd Ieee International Parallel and Distributed Processing Symposium, Program and Cd-Rom|
|Malladi S, Alves-Foss J. (2002) What are multi-protocol guessing attacks and how to prevent them Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2002: 77-82|