Follow
Ajay Kumar Eeralla
Ajay Kumar Eeralla
Department of Computer Science, University of Missouri
Verified email at mail.missouri.edu - Homepage
Title
Cited by
Cited by
Year
Frequency-minimal utility-maximal moving target defense against DDoS in SDN-based systems
S Debroy, P Calyam, M Nguyen, RL Neupane, B Mukherjee, AK Eeralla, ...
IEEE Transactions on Network and Service Management 17 (2), 890-903, 2020
272020
Formal analysis of vote privacy using computationally complete symbolic attacker
G Bana, R Chadha, AK Eeralla
European Symposium on Research in Computer Security, 350-372, 2018
182018
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
G Bana, R Chadha, AK Eeralla
https://eprint.iacr.org/2018/624, 2018
182018
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
G Bana, R Chadha, AK Eeralla
http://prosecco.gforge.inria.fr/personal/gebana/foo_long.pdf, 2018
182018
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability
G Bana, R Chadha, AK Eeralla, M Okada
ACM Transactions on Computational Logic (ToCL) 21 (1), 1-44, 2019
172019
Rule-Based Unification in Combined Theories and the Finite Variant Property
AK Eeralla, S Erbatur, AM Marshall, C Ringeissen
13th International Conference on Language and Automata Theory and …, 2019
82019
Bounded ACh unification
AK Eeralla, C Lynch
Mathematical Structures in Computer Science 30 (6), 664-682, 2020
72020
Bounded ACh Unification. CoRR abs/1811.05602 (2018)
AK Eeralla, C Lynch
21811
Unification in Non-Disjoint Combinations with Forward-Closed Theories
AK Eeralla, S Erbatur, AM Marshall, C Ringeissen
https://members.loria.fr/CRingeissen/files/papers/combi-fc.pdf, 0
2*
E-Brightpass: A Secure way to access social networks on smartphones
C Thotadi, M Debbala, S Rao, A Eeralla, B Palaniswamy, S Mookherji, ...
Cyber Security and Applications 2, 100021, 2024
2024
Introduction to the special issue: Unification
M Ayala-Rincón, P Balbiani
Mathematical Structures in Computer Science 30 (6), 570-571, 2020
2020
Machine-Aided Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
AK Eeralla
University of Missouri-Columbia, 2019
2019
Bounded Homomorphic Unification
AK Eeralla
Clarkson University, 2014
2014
Welcome to MVD 2016
S Basu, G Ciardo, A Miner, K Rozier, ISUC Map
The system can't perform the operation now. Try again later.
Articles 1–14