Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hrishikesh B. Acharya is active.

Publication


Featured researches published by Hrishikesh B. Acharya.


international conference on distributed computing systems | 2010

Projection and Division: Linear-Space Verification of Firewalls

Hrishikesh B. Acharya; Mohamed G. Gouda

A firewall is a packet filter that is placed at the entrance of a private network. It checks the header fields of each incoming packet into the private network and decides, based on the specified rules in the firewall, whether to accept the packet and allow it to proceed, or to discard the packet. A property of a firewall is a set of packets that the firewall is required to accept or discard. Associated with each firewall is a very large set of properties that the firewall needs to satisfy. The space and time complexity of the best known deterministic algorithm, for verifying that a given firewall satisfies a given property, is


international conference on computer communications | 2011

Firewall verification and redundancy checking are equivalent

Hrishikesh B. Acharya; Mohamed G. Gouda

O(n^d)


Theoretical Computer Science | 2011

Nash equilibria in stabilizing systems

Mohamed G. Gouda; Hrishikesh B. Acharya

, where


international symposium on stabilization safety and security of distributed systems | 2009

Nash Equilibria in Stabilizing Systems

Mohamed G. Gouda; Hrishikesh B. Acharya

n


international conference on network protocols | 2010

Firewall modules and modular firewalls

Hrishikesh B. Acharya; Aditya Joshi; Mohamed G. Gouda

is the number of rules in the given firewall and


Pervasive and Mobile Computing | 2013

The best keying protocol for sensor networks

Taehwan Choi; Hrishikesh B. Acharya; Mohamed G. Gouda

d


international conference on network protocols | 2009

Linear-time verification of firewalls

Hrishikesh B. Acharya; Mohamed G. Gouda

is the number of fields checked by the firewall. Usually,


next generation mobile applications, services and technologies | 2009

Delay Tolerant Networks: A Retrospective

Hrishikesh B. Acharya; H. N. Shah; V. Venkataraman

n


international conference on network protocols | 2016

Rules in play: On the complexity of routing tables and firewalls

Hrishikesh B. Acharya; Satyam Kumar; Mohit Wadhwa; Ayush Shah

is around


Symposium on Self-Stabilizing Systems | 2014

Incremental Verification of Computing Policies

Ehab S. Elmallah; Hrishikesh B. Acharya; Mohamed G. Gouda

2000

Collaboration


Dive into the Hrishikesh B. Acharya's collaboration.

Top Co-Authors

Avatar

Mohamed G. Gouda

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Taehwan Choi

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Devashish Gosain

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Sambuddho Chakravarty

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anshika Agarwal

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Rezwana Reaz

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Ayush Shah

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Jorge Arturo Cobb

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Vinayak Naik

Indraprastha Institute of Information Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge