BibTeX records: Ashish Kundu

download as .bib file

@article{DBLP:journals/corr/abs-2402-01760,
  author       = {Kausik Lakkaraju and
                  Vedant Khandelwal and
                  Biplav Srivastava and
                  Forest Agostinelli and
                  Hengtao Tang and
                  Prathamjeet Singh and
                  Dezhi Wu and
                  Matthew Irvin and
                  Ashish Kundu},
  title        = {Trust and ethical considerations in a multi-modal, explainable AI-driven
                  chatbot tutoring system: The case of collaboratively solving Rubik's
                  Cube},
  journal      = {CoRR},
  volume       = {abs/2402.01760},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.01760},
  doi          = {10.48550/ARXIV.2402.01760},
  eprinttype    = {arXiv},
  eprint       = {2402.01760},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-01760.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-00935,
  author       = {Adrian Shuai Li and
                  Arun Iyengar and
                  Ashish Kundu and
                  Elisa Bertino},
  title        = {Transfer Learning for Security: Challenges and Future Directions},
  journal      = {CoRR},
  volume       = {abs/2403.00935},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.00935},
  doi          = {10.48550/ARXIV.2403.00935},
  eprinttype    = {arXiv},
  eprint       = {2403.00935},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-00935.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-18774,
  author       = {Xun Xian and
                  Ganghua Wang and
                  Xuan Bi and
                  Jayanth Srinivasa and
                  Ashish Kundu and
                  Mingyi Hong and
                  Jie Ding},
  title        = {{RAW:} {A} Robust and Agile Plug-and-Play Watermark Framework for
                  AI-Generated Images with Provable Guarantees},
  journal      = {CoRR},
  volume       = {abs/2403.18774},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.18774},
  doi          = {10.48550/ARXIV.2403.18774},
  eprinttype    = {arXiv},
  eprint       = {2403.18774},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-18774.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/Bertino0HKS0MK23,
  author       = {Elisa Bertino and
                  Hyunwoo Lee and
                  Mengdie Huang and
                  Charalampos Katsis and
                  Zilin Shen and
                  Bruno Ribeiro and
                  Daniel De Mello and
                  Ashish Kundu},
  title        = {A Pro-Active Defense Framework for IoT Systems},
  booktitle    = {9th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2023, Atlanta, GA, USA, November 1-4, 2023},
  pages        = {125--132},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CIC58953.2023.00025},
  doi          = {10.1109/CIC58953.2023.00025},
  timestamp    = {Thu, 07 Mar 2024 22:43:57 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/Bertino0HKS0MK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/XianWSKBH023,
  author       = {Xun Xian and
                  Ganghua Wang and
                  Jayanth Srinivasa and
                  Ashish Kundu and
                  Xuan Bi and
                  Mingyi Hong and
                  Jie Ding},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Understanding Backdoor Attacks through the Adaptability Hypothesis},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {37952--37976},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/xian23a.html},
  timestamp    = {Mon, 28 Aug 2023 17:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/XianWSKBH023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/XianWSKBH023,
  author       = {Xun Xian and
                  Ganghua Wang and
                  Jayanth Srinivasa and
                  Ashish Kundu and
                  Xuan Bi and
                  Mingyi Hong and
                  Jie Ding},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {A Unified Detection Framework for Inference-Stage Backdoor Defenses},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/1868a3c73d0d2a44c42458575fa8514c-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/XianWSKBH023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ZhangKPX23,
  author       = {Yuchen Zhang and
                  Ashish Kundu and
                  Georgios Portokalidis and
                  Jun Xu},
  editor       = {Satish Chandra and
                  Kelly Blincoe and
                  Paolo Tonella},
  title        = {On the Dual Nature of Necessity in Use of Rust Unsafe Code},
  booktitle    = {Proceedings of the 31st {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023},
  pages        = {2032--2037},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3611643.3613878},
  doi          = {10.1145/3611643.3613878},
  timestamp    = {Mon, 04 Dec 2023 11:02:39 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ZhangKPX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/IyengarK23,
  author       = {Arun Iyengar and
                  Ashish Kundu},
  title        = {Large Language Models and Computer Security},
  booktitle    = {5th {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta,
                  GA, USA, November 1-4, 2023},
  pages        = {307--313},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPS-ISA58951.2023.00045},
  doi          = {10.1109/TPS-ISA58951.2023.00045},
  timestamp    = {Tue, 05 Mar 2024 12:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/IyengarK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-05680,
  author       = {Biplav Srivastava and
                  Kausik Lakkaraju and
                  Tarmo Koppel and
                  Vignesh Narayanan and
                  Ashish Kundu and
                  Sachindra Joshi},
  title        = {Evaluating Chatbots to Promote Users' Trust - Practices and Open Problems},
  journal      = {CoRR},
  volume       = {abs/2309.05680},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.05680},
  doi          = {10.48550/ARXIV.2309.05680},
  eprinttype    = {arXiv},
  eprint       = {2309.05680},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-05680.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-10780,
  author       = {Ganghua Wang and
                  Xun Xian and
                  Jayanth Srinivasa and
                  Ashish Kundu and
                  Xuan Bi and
                  Mingyi Hong and
                  Jie Ding},
  title        = {Demystifying Poisoning Backdoor Attacks from a Statistical Perspective},
  journal      = {CoRR},
  volume       = {abs/2310.10780},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.10780},
  doi          = {10.48550/ARXIV.2310.10780},
  eprinttype    = {arXiv},
  eprint       = {2310.10780},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-10780.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-13119,
  author       = {Xin Jin and
                  Charalampos Katsis and
                  Fan Sang and
                  Jiahao Sun and
                  Elisa Bertino and
                  Ramana Rao Kompella and
                  Ashish Kundu},
  title        = {Prometheus: Infrastructure Security Posture Analysis with AI-generated
                  Attack Graphs},
  journal      = {CoRR},
  volume       = {abs/2312.13119},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.13119},
  doi          = {10.48550/ARXIV.2312.13119},
  eprinttype    = {arXiv},
  eprint       = {2312.13119},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-13119.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acml/GulatiVMK22,
  author       = {Kshitij Gulati and
                  Gaurav Verma and
                  Mukesh K. Mohania and
                  Ashish Kundu},
  editor       = {Vineeth N. Balasubramanian and
                  Ivor W. Tsang},
  title        = {BeautifAI - Personalised Occasion-based Makeup Recommendation},
  booktitle    = {Asian Conference on Machine Learning, {ACML} 2022, 12-14 December
                  2022, Hyderabad, India},
  series       = {Proceedings of Machine Learning Research},
  volume       = {189},
  pages        = {407--419},
  publisher    = {{PMLR}},
  year         = {2022},
  url          = {https://proceedings.mlr.press/v189/gulati23a.html},
  timestamp    = {Mon, 19 Jun 2023 15:52:13 +0200},
  biburl       = {https://dblp.org/rec/conf/acml/GulatiVMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LeeMKLB22,
  author       = {Hyunwoo Lee and
                  Anand Mudgerikar and
                  Ashish Kundu and
                  Ninghui Li and
                  Elisa Bertino},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {An Infection-Identifying and Self-Evolving System for IoT Early Defense
                  from Multi-Step Attacks},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {549--568},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_27},
  doi          = {10.1007/978-3-031-17146-8\_27},
  timestamp    = {Tue, 27 Sep 2022 21:07:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LeeMKLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-07164,
  author       = {Xin Jin and
                  Charalampos Katsis and
                  Fan Sang and
                  Jiahao Sun and
                  Ashish Kundu and
                  Ramana Kompella},
  title        = {Edge Security: Challenges and Issues},
  journal      = {CoRR},
  volume       = {abs/2206.07164},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.07164},
  doi          = {10.48550/ARXIV.2206.07164},
  eprinttype    = {arXiv},
  eprint       = {2206.07164},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-07164.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/KunduAS21,
  author       = {Ashish Kundu and
                  Arun Ayachitula and
                  Nagamani Sistla},
  title        = {Similarities and Learnings from Ancient Literature on Blockchain Consensus
                  and Integrity},
  booktitle    = {3rd {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,
                  GA, USA, December 13-15, 2021},
  pages        = {303--306},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPSISA52974.2021.00054},
  doi          = {10.1109/TPSISA52974.2021.00054},
  timestamp    = {Thu, 21 Apr 2022 16:21:01 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/KunduAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/KunduRK21,
  author       = {Ashish Kundu and
                  Abhishek Reddypalle and
                  Chinmay Kundu},
  title        = {AI-Driven Selective Protection of Multimedia Data},
  booktitle    = {3rd {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,
                  GA, USA, December 13-15, 2021},
  pages        = {307--313},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPSISA52974.2021.00055},
  doi          = {10.1109/TPSISA52974.2021.00055},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/KunduRK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/KunduLH20,
  author       = {Ashish Kundu and
                  Zhiqiang Lin and
                  Joshua Hammond},
  title        = {Energy Attacks on Mobile Devices},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {107--117},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00024},
  doi          = {10.1109/TPS-ISA50397.2020.00024},
  timestamp    = {Tue, 26 Jan 2021 14:00:08 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/KunduLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/ZhangSKSIL20,
  author       = {Qi Zhang and
                  Zehra Sura and
                  Ashish Kundu and
                  Gong Su and
                  Arun Iyengar and
                  Ling Liu},
  title        = {StackVault: Protection from Untrusted Functions},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {294--306},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00045},
  doi          = {10.1109/TPS-ISA50397.2020.00045},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/ZhangSKSIL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-04487,
  author       = {Ashish Kundu and
                  Arun Ayachitula and
                  Nagamani Sistla},
  title        = {Similarities and Learnings from Ancient Literature on Blockchain Consensus
                  and Integrity},
  journal      = {CoRR},
  volume       = {abs/2006.04487},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.04487},
  eprinttype    = {arXiv},
  eprint       = {2006.04487},
  timestamp    = {Fri, 12 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-04487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdiq/BertinoKS19,
  author       = {Elisa Bertino and
                  Ashish Kundu and
                  Zehra Sura},
  title        = {Data Transparency with Blockchain and {AI} Ethics},
  journal      = {{ACM} J. Data Inf. Qual.},
  volume       = {11},
  number       = {4},
  pages        = {16:1--16:8},
  year         = {2019},
  url          = {https://doi.org/10.1145/3312750},
  doi          = {10.1145/3312750},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdiq/BertinoKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciot/PayneBK19,
  author       = {Josh Payne and
                  Karan K. Budhraja and
                  Ashish Kundu},
  editor       = {Elisa Bertino and
                  Carl K. Chang and
                  Peter Chen and
                  Ernesto Damiani and
                  Michael Goul and
                  Katsunori Oyama},
  title        = {How Secure Is Your IoT Network?},
  booktitle    = {2019 {IEEE} International Congress on Internet of Things, {ICIOT}
                  2019, Milan, Italy, July 8-13, 2019},
  pages        = {181--188},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICIOT.2019.00038},
  doi          = {10.1109/ICIOT.2019.00038},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciot/PayneBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/PayneK19,
  author       = {Josh Payne and
                  Ashish Kundu},
  title        = {Towards Deep Federated Defenses Against Malware in Cloud Ecosystems},
  booktitle    = {First {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles,
                  CA, USA, December 12-14, 2019},
  pages        = {92--100},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPS-ISA48467.2019.00020},
  doi          = {10.1109/TPS-ISA48467.2019.00020},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/PayneK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/MalvankarPBKCM19,
  author       = {Abhishek Malvankar and
                  Josh Payne and
                  Karan K. Budhraja and
                  Ashish Kundu and
                  Suresh Chari and
                  Mukesh K. Mohania},
  title        = {Malware Containment in Cloud},
  booktitle    = {First {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles,
                  CA, USA, December 12-14, 2019},
  pages        = {221--227},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPS-ISA48467.2019.00036},
  doi          = {10.1109/TPS-ISA48467.2019.00036},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/MalvankarPBKCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/GunasingheKBKCS19,
  author       = {Hasini Gunasinghe and
                  Ashish Kundu and
                  Elisa Bertino and
                  Hugo Krawczyk and
                  Suresh Chari and
                  Kapil Singh and
                  Dong Su},
  editor       = {Ling Liu and
                  Ryen W. White and
                  Amin Mantrach and
                  Fabrizio Silvestri and
                  Julian J. McAuley and
                  Ricardo Baeza{-}Yates and
                  Leila Zia},
  title        = {PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity
                  Assets},
  booktitle    = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA,
                  May 13-17, 2019},
  pages        = {594--604},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308558.3313574},
  doi          = {10.1145/3308558.3313574},
  timestamp    = {Sun, 22 Sep 2019 18:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/www/GunasingheKBKCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-03710,
  author       = {Qi Zhang and
                  Zehra Sura and
                  Ashish Kundu and
                  Gong Su and
                  Arun Iyengar and
                  Ling Liu},
  title        = {StackVault: Protection from Untrusted Functions},
  journal      = {CoRR},
  volume       = {abs/1907.03710},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.03710},
  eprinttype    = {arXiv},
  eprint       = {1907.03710},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-03710.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-03270,
  author       = {Mustafa Canim and
                  Ashish Kundu and
                  Josh Payne},
  title        = {Uncheatable Machine Learning Inference},
  journal      = {CoRR},
  volume       = {abs/1908.03270},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.03270},
  eprinttype    = {arXiv},
  eprint       = {1908.03270},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-03270.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-12370,
  author       = {Josh Payne and
                  Ashish Kundu},
  title        = {Towards Deep Federated Defenses Against Malware in Cloud Ecosystems},
  journal      = {CoRR},
  volume       = {abs/1912.12370},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.12370},
  eprinttype    = {arXiv},
  eprint       = {1912.12370},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-12370.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-12373,
  author       = {Josh Payne and
                  Karan K. Budhraja and
                  Ashish Kundu},
  title        = {How Secure Is Your IoT Network?},
  journal      = {CoRR},
  volume       = {abs/1912.12373},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.12373},
  eprinttype    = {arXiv},
  eprint       = {1912.12373},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-12373.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/IyengarKP18,
  author       = {Arun Iyengar and
                  Ashish Kundu and
                  George Pallis},
  title        = {Healthcare Informatics and Privacy},
  journal      = {{IEEE} Internet Comput.},
  volume       = {22},
  number       = {2},
  pages        = {29--31},
  year         = {2018},
  url          = {https://doi.org/10.1109/MIC.2018.022021660},
  doi          = {10.1109/MIC.2018.022021660},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/IyengarKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ArshadKBGK18,
  author       = {Muhammad Umer Arshad and
                  Ashish Kundu and
                  Elisa Bertino and
                  Arif Ghafoor and
                  Chinmay Kundu},
  title        = {Efficient and Scalable Integrity Verification of Data and Query Results
                  for Graph Databases},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {30},
  number       = {5},
  pages        = {866--879},
  year         = {2018},
  url          = {https://doi.org/10.1109/TKDE.2017.2776221},
  doi          = {10.1109/TKDE.2017.2776221},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ArshadKBGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/KunduSS18,
  author       = {Ashish Kundu and
                  Zehra Sura and
                  Upendra Sharma},
  title        = {Collaborative and Accountable Hardware Governance Using Blockchain},
  booktitle    = {4th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018},
  pages        = {114--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CIC.2018.00026},
  doi          = {10.1109/CIC.2018.00026},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/KunduSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/VoKM18,
  author       = {Hoang Tam Vo and
                  Ashish Kundu and
                  Mukesh K. Mohania},
  editor       = {Michael H. B{\"{o}}hlen and
                  Reinhard Pichler and
                  Norman May and
                  Erhard Rahm and
                  Shan{-}Hung Wu and
                  Katja Hose},
  title        = {Research Directions in Blockchain Data Management and Analytics},
  booktitle    = {Proceedings of the 21st International Conference on Extending Database
                  Technology, {EDBT} 2018, Vienna, Austria, March 26-29, 2018},
  pages        = {445--448},
  publisher    = {OpenProceedings.org},
  year         = {2018},
  url          = {https://doi.org/10.5441/002/edbt.2018.43},
  doi          = {10.5441/002/EDBT.2018.43},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/VoKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/IyengarKSZ18,
  author       = {Arun Iyengar and
                  Ashish Kundu and
                  Upendra Sharma and
                  Ping Zhang},
  title        = {A Trusted Healthcare Data Analytics Cloud Platform},
  booktitle    = {38th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2018, Vienna, Austria, July 2-6, 2018},
  pages        = {1238--1249},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDCS.2018.00123},
  doi          = {10.1109/ICDCS.2018.00123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/IyengarKSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/ArshadKBGK18,
  author       = {Muhammad Umer Arshad and
                  Ashish Kundu and
                  Elisa Bertino and
                  Arif Ghafoor and
                  Chinmay Kundu},
  title        = {Efficient and Scalable Integrity Verification of Data and Query Results
                  for Graph Databases},
  booktitle    = {34th {IEEE} International Conference on Data Engineering, {ICDE} 2018,
                  Paris, France, April 16-19, 2018},
  pages        = {1821--1822},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDE.2018.00268},
  doi          = {10.1109/ICDE.2018.00268},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/ArshadKBGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/BahramiMBKSK17,
  author       = {Mehdi Bahrami and
                  Abhishek Malvankar and
                  Karan K. Budhraja and
                  Chinmay Kundu and
                  Mukesh Singhal and
                  Ashish Kundu},
  editor       = {Geoffrey C. Fox},
  title        = {Compliance-Aware Provisioning of Containers on Cloud},
  booktitle    = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD),
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {696--700},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CLOUD.2017.95},
  doi          = {10.1109/CLOUD.2017.95},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/BahramiMBKSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/BudhrajaMBKKS17,
  author       = {Karan K. Budhraja and
                  Abhishek Malvankar and
                  Mehdi Bahrami and
                  Chinmay Kundu and
                  Ashish Kundu and
                  Mukesh Singhal},
  editor       = {Geoffrey C. Fox},
  title        = {Risk-Based Packet Routing for Privacy and Compliance-Preserving {SDN}},
  booktitle    = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD),
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {761--765},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CLOUD.2017.109},
  doi          = {10.1109/CLOUD.2017.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/BudhrajaMBKKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KunduKB17,
  author       = {Ashish Kundu and
                  Chinmay Kundu and
                  Karan K. Budhraja},
  title        = {Security Analytics of Network Flow Data of IoT and Mobile Devices
                  (Work-in-progress)},
  journal      = {CoRR},
  volume       = {abs/1704.03049},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.03049},
  eprinttype    = {arXiv},
  eprint       = {1704.03049},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KunduKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KunduLH17,
  author       = {Ashish Kundu and
                  Zhiqiang Lin and
                  Joshua Hammond},
  title        = {Energy Attacks on Mobile Devices},
  journal      = {CoRR},
  volume       = {abs/1704.04464},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.04464},
  eprinttype    = {arXiv},
  eprint       = {1704.04464},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KunduLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-03807,
  author       = {Ashish Kundu},
  title        = {Principle of Need-to-Act},
  journal      = {CoRR},
  volume       = {abs/1708.03807},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.03807},
  eprinttype    = {arXiv},
  eprint       = {1708.03807},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-03807.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmrd/BeatyCCDHKMP16,
  author       = {Kirk A. Beaty and
                  J. M. Chow and
                  Renato Luiz de Freitas Cunha and
                  K. K. Das and
                  M. F. Hulber and
                  Ashish Kundu and
                  V. Michelini and
                  E. R. Palmer},
  title        = {Managing sensitive applications in the public cloud},
  journal      = {{IBM} J. Res. Dev.},
  volume       = {60},
  number       = {2-3},
  year         = {2016},
  url          = {https://doi.org/10.1147/JRD.2015.2513720},
  doi          = {10.1147/JRD.2015.2513720},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ibmrd/BeatyCCDHKMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/KatsunoKDTSDM16,
  author       = {Yasuharu Katsuno and
                  Ashish Kundu and
                  Koushik K. Das and
                  Hitomi Takahashi and
                  Robert Schloss and
                  Prasenjit Dey and
                  Mukesh K. Mohania},
  title        = {Security, Compliance, and Agile Deployment of Personal Identifiable
                  Information Solutions on a Public Cloud},
  booktitle    = {9th {IEEE} International Conference on Cloud Computing, {CLOUD} 2016,
                  San Francisco, CA, USA, June 27 - July 2, 2016},
  pages        = {359--366},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CLOUD.2016.0055},
  doi          = {10.1109/CLOUD.2016.0055},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/KatsunoKDTSDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sc/BahramiLSK16,
  author       = {Mehdi Bahrami and
                  Dong Li and
                  Mukesh Singhal and
                  Ashish Kundu},
  title        = {An Efficient Parallel Implementation of a Light-weight Data Privacy
                  Method for Mobile Cloud Users},
  booktitle    = {Seventh International Workshop on Data-Intensive Computing in the
                  Clouds, DataCloud@SC 2016, Salt Lake, UT, USA, November 14, 2016},
  pages        = {51--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DataCloud.2016.011},
  doi          = {10.1109/DATACLOUD.2016.011},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sc/BahramiLSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/DeshpandeSABK14,
  author       = {Pralhad Deshpande and
                  Shachi Sharma and
                  Arup Acharya and
                  Kirk A. Beaty and
                  Ashish Kundu},
  title        = {Use-Case Centric Dashboard for Cloud Solutions},
  booktitle    = {{IEEE} International Conference on Services Computing, {SCC} 2014,
                  Anchorage, AK, USA, June 27 - July 2, 2014},
  pages        = {840--841},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SCC.2014.115},
  doi          = {10.1109/SCC.2014.115},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/DeshpandeSABK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ArshadKBMG14,
  author       = {Muhammad Umer Arshad and
                  Ashish Kundu and
                  Elisa Bertino and
                  Krishna Madhavan and
                  Arif Ghafoor},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {Security of graph data: hashing schemes and definitions},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {223--234},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557564},
  doi          = {10.1145/2557547.2557564},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ArshadKBMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/NaikBK14,
  author       = {Vijay K. Naik and
                  Kirk A. Beaty and
                  Ashish Kundu},
  title        = {Service Usage Metering in Hybrid Cloud Environments},
  booktitle    = {2014 {IEEE} International Conference on Cloud Engineering, Boston,
                  MA, USA, March 11-14, 2014},
  pages        = {253--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IC2E.2014.76},
  doi          = {10.1109/IC2E.2014.76},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/NaikBK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChandraLKK14,
  author       = {Swarup Chandra and
                  Zhiqiang Lin and
                  Ashish Kundu and
                  Latifur Khan},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Towards a Systematic Study of the Covert Channel Attacks in Smartphones},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {427--435},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_29},
  doi          = {10.1007/978-3-319-23829-6\_29},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChandraLKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KunduB13,
  author       = {Ashish Kundu and
                  Elisa Bertino},
  title        = {Privacy-preserving authentication of trees and graphs},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {6},
  pages        = {467--494},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0198-5},
  doi          = {10.1007/S10207-013-0198-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KunduB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/BeatyKNA13,
  author       = {Kirk A. Beaty and
                  Ashish Kundu and
                  Vijay K. Naik and
                  Arup Acharya},
  title        = {Network-Level Access Control Management for the Cloud},
  booktitle    = {2013 {IEEE} International Conference on Cloud Engineering, {IC2E}
                  2013, San Francisco, CA, USA, March 25-27, 2013},
  pages        = {98--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IC2E.2013.18},
  doi          = {10.1109/IC2E.2013.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/BeatyKNA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MidiKB13,
  author       = {Daniele Midi and
                  Ashish Kundu and
                  Elisa Bertino},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {Towards Authenticated Objects},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {777--783},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_70},
  doi          = {10.1007/978-3-642-38631-2\_70},
  timestamp    = {Tue, 09 Feb 2021 08:50:29 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/MidiKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KunduAB12,
  author       = {Ashish Kundu and
                  Mikhail J. Atallah and
                  Elisa Bertino},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Leakage-free redactable signatures},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {307--316},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133639},
  doi          = {10.1145/2133601.2133639},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/KunduAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/Kundu12,
  author       = {Ashish Kundu},
  editor       = {Anastasios Kementsietsidis and
                  Marcos Antonio Vaz Salles},
  title        = {Authentication of Data on Devices},
  booktitle    = {Workshops Proceedings of the {IEEE} 28th International Conference
                  on Data Engineering, {ICDE} 2012, Arlington, VA, USA, April 1-5, 2012},
  pages        = {236--242},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDEW.2012.79},
  doi          = {10.1109/ICDEW.2012.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/Kundu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunduAB12,
  author       = {Ashish Kundu and
                  Mikhail J. Atallah and
                  Elisa Bertino},
  title        = {Efficient Leakage-free Authentication of Trees, Graphs and Forests},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunduAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunduB12,
  author       = {Ashish Kundu and
                  Elisa Bertino},
  title        = {On Hashing Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunduB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/KunduB11,
  author       = {Ashish Kundu and
                  Elisa Bertino},
  title        = {A New Class of Buffer Overflow Attacks},
  booktitle    = {2011 International Conference on Distributed Computing Systems, {ICDCS}
                  2011, Minneapolis, Minnesota, USA, June 20-24, 2011},
  pages        = {730--739},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICDCS.2011.63},
  doi          = {10.1109/ICDCS.2011.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/KunduB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/KunduB10,
  author       = {Ashish Kundu and
                  Elisa Bertino},
  editor       = {Ioana Manolescu and
                  Stefano Spaccapietra and
                  Jens Teubner and
                  Masaru Kitsuregawa and
                  Alain L{\'{e}}ger and
                  Felix Naumann and
                  Anastasia Ailamaki and
                  Fatma {\"{O}}zcan},
  title        = {How to authenticate graphs without leaking},
  booktitle    = {{EDBT} 2010, 13th International Conference on Extending Database Technology,
                  Lausanne, Switzerland, March 22-26, 2010, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {426},
  pages        = {609--620},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1739041.1739114},
  doi          = {10.1145/1739041.1739114},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/KunduB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/Kundu09,
  author       = {Ashish Kundu},
  editor       = {Sheikh Iqbal Ahamed and
                  Elisa Bertino and
                  Carl K. Chang and
                  Vladimir Getov and
                  Lin Liu and
                  Ming Hua and
                  Rajesh Subramanyan},
  title        = {{SN2K} Attacks and Honest Services},
  booktitle    = {Proceedings of the 33rd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
                  USA, July 20-24, 2009. Volume 2},
  pages        = {445--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/COMPSAC.2009.174},
  doi          = {10.1109/COMPSAC.2009.174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/Kundu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AtallahFK08,
  author       = {Mikhail J. Atallah and
                  Greg N. Frederickson and
                  Ashish Kundu},
  title        = {A tree-covering problem arising in integrity of tree-structured data},
  journal      = {Inf. Process. Lett.},
  volume       = {109},
  number       = {1},
  pages        = {79--82},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ipl.2008.09.004},
  doi          = {10.1016/J.IPL.2008.09.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/AtallahFK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/KunduB08,
  author       = {Ashish Kundu and
                  Elisa Bertino},
  title        = {Structural signatures for tree data structures},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {1},
  number       = {1},
  pages        = {138--150},
  year         = {2008},
  url          = {http://www.vldb.org/pvldb/vol1/1453876.pdf},
  doi          = {10.14778/1453856.1453876},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/KunduB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/KunduB08,
  author       = {Ashish Kundu and
                  Elisa Bertino},
  title        = {A New Model for Secure Dissemination of {XML} Content},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {38},
  number       = {3},
  pages        = {292--301},
  year         = {2008},
  url          = {https://doi.org/10.1109/TSMCC.2008.919213},
  doi          = {10.1109/TSMCC.2008.919213},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/KunduB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/AtallahCK08,
  author       = {Mikhail J. Atallah and
                  YounSun Cho and
                  Ashish Kundu},
  editor       = {Gustavo Alonso and
                  Jos{\'{e}} A. Blakeley and
                  Arbee L. P. Chen},
  title        = {Efficient Data Authentication in an Environment of Untrusted Third-Party
                  Distributors},
  booktitle    = {Proceedings of the 24th International Conference on Data Engineering,
                  {ICDE} 2008, April 7-12, 2008, Canc{\'{u}}n, Mexico},
  pages        = {696--704},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDE.2008.4497478},
  doi          = {10.1109/ICDE.2008.4497478},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/AtallahCK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/KunduB06,
  author       = {Ashish Kundu and
                  Elisa Bertino},
  title        = {Secure Dissemination of {XML} Content Using Structure-based Routing},
  booktitle    = {Tenth {IEEE} International Enterprise Distributed Object Computing
                  Conference {(EDOC} 2006), 16-20 October 2006, Hong Kong, China},
  pages        = {153--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/EDOC.2006.46},
  doi          = {10.1109/EDOC.2006.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/KunduB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/AgarwalCDKKKMMS05,
  author       = {Vikas Agarwal and
                  Girish Chafle and
                  Koustuv Dasgupta and
                  Neeran M. Karnik and
                  Arun Kumar and
                  Ashish Kundu and
                  Anupam Mediratta and
                  Sumit Mittal and
                  Biplav Srivastava},
  editor       = {Manuela M. Veloso and
                  Subbarao Kambhampati},
  title        = {Building Applications Using End to End Composition of Web Services},
  booktitle    = {Proceedings, The Twentieth National Conference on Artificial Intelligence
                  and the Seventeenth Innovative Applications of Artificial Intelligence
                  Conference, July 9-13, 2005, Pittsburgh, Pennsylvania, {USA}},
  pages        = {1672--1673},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {2005},
  url          = {http://www.aaai.org/Library/AAAI/2005/isd05-002.php},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/AgarwalCDKKKMMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/AgarwalDKKKMS05,
  author       = {Vikas Agarwal and
                  Koustuv Dasgupta and
                  Neeran M. Karnik and
                  Arun Kumar and
                  Ashish Kundu and
                  Sumit Mittal and
                  Biplav Srivastava},
  editor       = {Allan Ellis and
                  Tatsuya Hagino},
  title        = {A service creation environment based on end to end composition of
                  Web services},
  booktitle    = {Proceedings of the 14th international conference on World Wide Web,
                  {WWW} 2005, Chiba, Japan, May 10-14, 2005},
  pages        = {128--137},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1060745.1060768},
  doi          = {10.1145/1060745.1060768},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/AgarwalDKKKMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/BanavarBCCGGHHHKKKOSSW04,
  author       = {Guruduth Banavar and
                  Lawrence D. Bergman and
                  Richard Cardone and
                  Vianney Chevalier and
                  Yves Gaeremynck and
                  Frederique Giraud and
                  Christine Halverson and
                  Shin'ichi Hirose and
                  Masahiro Hori and
                  Fumihiko Kitayama and
                  Goh Kondoh and
                  Ashish Kundu and
                  Kouichi Ono and
                  Andreas Schade and
                  Danny Soroker and
                  Kim Winz},
  title        = {An Authoring Technology for Multidevice Web Applications},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {3},
  number       = {3},
  pages        = {83--93},
  year         = {2004},
  url          = {https://doi.org/10.1109/MPRV.2004.1321033},
  doi          = {10.1109/MPRV.2004.1321033},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/BanavarBCCGGHHHKKKOSSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics