A study of the energy consumption characteristics of cryptographic algorithms and security protocols NR Potlapally, S Ravi, A Raghunathan, NK Jha IEEE Transactions on mobile computing 5 (2), 128-143, 2005 | 554 | 2005 |
Analyzing the energy consumption of security protocols NR Potlapally, S Ravi, A Raghunathan, NK Jha Proceedings of the 2003 international symposium on Low power electronics and …, 2003 | 404 | 2003 |
Optimizing public-key encryption for wireless clients NR Potlapally, S Ravi, A Raghunathan, G Lakshminarayana 2002 IEEE International Conference on Communications. Conference Proceedings …, 2002 | 287 | 2002 |
Threat detection and mitigation through run-time introspection and instrumentation H Sultan, J Schweitzer, DL BAILEY, GB Roth, NR Potlapally US Patent 9,876,815, 2018 | 147 | 2018 |
Securing wireless data: System architecture challenges S Ravi, A Raghunathan, N Potlapally Proceedings of the 15th international symposium on System Synthesis, 195-200, 2002 | 130 | 2002 |
Hardware mechanisms for memory authentication: A survey of existing techniques and engines R Elbaz, D Champagne, C Gebotys, RB Lee, N Potlapally, L Torres Transactions on Computational Science IV: Special Issue on Security in …, 2009 | 120 | 2009 |
Techniques for efficient security processing A Raghunathan, S Ravi, N Potlapally, S Chakradhar, M Sankaradas US Patent App. 10/259,569, 2003 | 101 | 2003 |
System design methodologies for a wireless security processing platform S Ravi, A Raghunathan, N Potlapally, M Sankaradass Proceedings of the 39th annual Design Automation Conference, 777-782, 2002 | 99 | 2002 |
Allocating processor resources based on a service-level agreement RG Patel, NR Potlapally, WJ Earl US Patent 9,864,636, 2018 | 90 | 2018 |
Detecting unauthorized websites BL Speegle, NR Potlapally US Patent 8,943,588, 2015 | 66 | 2015 |
Securing client-specified credentials at cryptographically attested resources NR Potlapally, AJ Doane, EJ Brandwine, RE Fitzgerald US Patent 10,389,709, 2019 | 63 | 2019 |
Hardware security in practice: Challenges and opportunities N Potlapally 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 93-98, 2011 | 59 | 2011 |
Allocating processor resources based on a task identifier RG Patel, WJ Earl, NR Potlapally US Patent 9,491,112, 2016 | 54 | 2016 |
Datacenter power management optimizations NR Potlapally, JR Hamilton US Patent 9,557,792, 2017 | 53 | 2017 |
Hardware-based mechanisms for updating computer systems MD Marr, NR Potlapally US Patent 9,176,752, 2015 | 53 | 2015 |
Remote attestation of host devices NR Potlapally, R Chawla, JR Volkman, MD Marr US Patent 9,619,238, 2017 | 50 | 2017 |
Trusted computing host NR Potlapally, MD Marr, EJ Brandwine, DL BAILEY US Patent 9,147,086, 2015 | 49 | 2015 |
Power mode based macro-models for power estimation of electronic circuits A Raghunathan, G Lakshminarayana, N Potlapally, MS Hsiao, ... US Patent 6,735,744, 2004 | 45 | 2004 |
Detecting anomalous behavior in an electronic environment using hardware-based information NR Potlapally, DL BAILEY, R Weatherly US Patent 9,904,587, 2018 | 42 | 2018 |
Accurate power macro-modeling techniques for complex RTL circuits NR Potlapally, A Raghunathan, G Lakshminarayana, MS Hsiao, ... VLSI Design 2001. Fourteenth International Conference on VLSI Design, 235-241, 2001 | 42 | 2001 |