Sreekanth Malladi
Dakota State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sreekanth Malladi.
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications | 2011
Sreekanth Malladi
In [Mil03,LM05], Millen-Lynch-Meadows proved that, under some restrictions on messages, including identities for canceling an encryption and a decryption within the same term during analysis will be redundant. i.e., they will not lead to any new attacks that were not found without them. In this paper, we prove that slightly modified restrictions are sufficient to safely remove those identities, even when protocols contain operators such as the notorious Exclusive-OR operator that break the free algebra assumption with their own identities, in addition to the identities considered by Millen-Lynch-Meadows.
information assurance and security | 2007
Sreekanth Malladi; Omar F. El-Gayar; Kevin Streff
In 2004, Dakota State University proposed a model for information assurance and computer security program development. That model provided a framework for developing undergraduate and graduate programs at DSU. This paper provides insight into experiences and lessons learned to further implement that model. The paper details modifications to both the undergraduate and graduate information assurance programs as a result of specific issues and challenges. Further, the paper highlights the introduction of a new terminal degree that includes an information assurance specialization. As a national center of excellence in information assurance education, we are confident that this paper will be helpful to universities around the world in either developing new or improving existing IA programs.
international parallel and distributed processing symposium | 2008
Sreekanth Malladi; Gurdeep S Hura
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences and non-free term algebras. We argue that constraint solving for bounded process analysis can be used in conjunction with decidability of context-explicit protocols as a verification tool and can overcome those limitations. However, this is possible only when new decidability results are obtained for protocol security, especially in presence of non-standard inferences and non-free term algebras.
arXiv: Cryptography and Security | 2010
Sreekanth Malladi; Bezawada Bruhadeshwar; Kishore Kothapalli
arXiv: Cryptography and Security | 2010
Sreekanth Malladi
hawaii international conference on system sciences | 2012
Nick Spear; Sreekanth Malladi; Sandeep Lakkaraju
arXiv: Cryptography and Security | 2010
Sreekanth Malladi
arXiv: Cryptography and Security | 2010
Sreekanth Malladi; Pascal Lafourcade
arXiv: Cryptography and Security | 2010
Sreekanth Malladi
arXiv: Cryptography and Security | 2010
Sreekanth Malladi