Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sreekanth Malladi is active.

Publication


Featured researches published by Sreekanth Malladi.


TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications | 2011

Soundness of removing cancellation identities in protocol analysis under Exclusive-OR

Sreekanth Malladi

In [Mil03,LM05], Millen-Lynch-Meadows proved that, under some restrictions on messages, including identities for canceling an encryption and a decryption within the same term during analysis will be redundant. i.e., they will not lead to any new attacks that were not found without them. In this paper, we prove that slightly modified restrictions are sufficient to safely remove those identities, even when protocols contain operators such as the notorious Exclusive-OR operator that break the free algebra assumption with their own identities, in addition to the identities considered by Millen-Lynch-Meadows.


information assurance and security | 2007

Experiences and lessons learned in the design and implementation of an Information Assurance curriculum

Sreekanth Malladi; Omar F. El-Gayar; Kevin Streff

In 2004, Dakota State University proposed a model for information assurance and computer security program development. That model provided a framework for developing undergraduate and graduate programs at DSU. This paper provides insight into experiences and lessons learned to further implement that model. The paper details modifications to both the undergraduate and graduate information assurance programs as a result of specific issues and challenges. Further, the paper highlights the introduction of a new terminal degree that includes an information assurance specialization. As a national center of excellence in information assurance education, we are confident that this paper will be helpful to universities around the world in either developing new or improving existing IA programs.


international parallel and distributed processing symposium | 2008

What is the best way to prove a cryptographic protocol correct

Sreekanth Malladi; Gurdeep S Hura

In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences and non-free term algebras. We argue that constraint solving for bounded process analysis can be used in conjunction with decidability of context-explicit protocols as a verification tool and can overcome those limitations. However, this is possible only when new decidability results are obtained for protocol security, especially in presence of non-standard inferences and non-free term algebras.


arXiv: Cryptography and Security | 2010

Automatic analysis of distance bounding protocols

Sreekanth Malladi; Bezawada Bruhadeshwar; Kishore Kothapalli


arXiv: Cryptography and Security | 2010

Protocol indepedence through disjoint encryption under Exclusive-OR

Sreekanth Malladi


hawaii international conference on system sciences | 2012

Analyzing Workflows in Business Processes for Obstructions due to Authorization Policies

Nick Spear; Sreekanth Malladi; Sandeep Lakkaraju


arXiv: Cryptography and Security | 2010

How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR

Sreekanth Malladi


arXiv: Cryptography and Security | 2010

How to prevent type-flaw attacks on security protocols under algebraic properties

Sreekanth Malladi; Pascal Lafourcade


arXiv: Cryptography and Security | 2010

How to prevent type-flaw and multi-protocol attacks on cryptographic protocols under Exclusive-OR

Sreekanth Malladi


arXiv: Cryptography and Security | 2010

Disabling equational theories in unification for cryptographic protocol analysis through tagging

Sreekanth Malladi

Collaboration


Dive into the Sreekanth Malladi's collaboration.

Top Co-Authors

Avatar

Kevin Streff

Dakota State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gurdeep S Hura

University of Maryland Eastern Shore

View shared research outputs
Top Co-Authors

Avatar

Nick Spear

Dakota State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kishore Kothapalli

International Institute of Information Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge