| A study of the energy consumption characteristics of cryptographic algorithms and security protocols NR Potlapally, S Ravi, A Raghunathan, NK Jha IEEE Transactions on mobile computing 5 (2), 128-143, 2005 | 581 | 2005 |
| Analyzing the energy consumption of security protocols NR Potlapally, S Ravi, A Raghunathan, NK Jha Proceedings of the 2003 international symposium on Low power electronics and …, 2003 | 416 | 2003 |
| Optimizing public-key encryption for wireless clients NR Potlapally, S Ravi, A Raghunathan, G Lakshminarayana 2002 IEEE International Conference on Communications. Conference Proceedings …, 2002 | 285 | 2002 |
| Threat detection and mitigation through run-time introspection and instrumentation H Sultan, J Schweitzer, DL BAILEY, GB Roth, NR Potlapally US Patent 9,876,815, 2018 | 160 | 2018 |
| Hardware mechanisms for memory authentication: A survey of existing techniques and engines R Elbaz, D Champagne, C Gebotys, RB Lee, N Potlapally, L Torres Transactions on Computational Science IV: Special Issue on Security in …, 2009 | 135 | 2009 |
| Securing wireless data: System architecture challenges S Ravi, A Raghunathan, N Potlapally Proceedings of the 15th international symposium on System Synthesis, 195-200, 2002 | 130 | 2002 |
| Allocating processor resources based on a service-level agreement RG Patel, NR Potlapally, WJ Earl US Patent 9,864,636, 2018 | 101 | 2018 |
| System design methodologies for a wireless security processing platform S Ravi, A Raghunathan, N Potlapally, M Sankaradass Proceedings of the 39th annual Design Automation Conference, 777-782, 2002 | 101 | 2002 |
| Techniques for efficient security processing A Raghunathan, S Ravi, N Potlapally, S Chakradhar, M Sankaradas US Patent App. 10/259,569, 2003 | 96 | 2003 |
| Allocating processor resources based on a task identifier RG Patel, WJ Earl, NR Potlapally US Patent 9,491,112, 2016 | 77 | 2016 |
| Hardware security in practice: Challenges and opportunities N Potlapally 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 93-98, 2011 | 73 | 2011 |
| Detecting unauthorized websites BL Speegle, NR Potlapally US Patent 8,943,588, 2015 | 71 | 2015 |
| Securing client-specified credentials at cryptographically attested resources NR Potlapally, AJ Doane, EJ Brandwine, RE Fitzgerald US Patent 10,389,709, 2019 | 67 | 2019 |
| Datacenter power management optimizations NR Potlapally, JR Hamilton US Patent 9,557,792, 2017 | 67 | 2017 |
| Hardware-based mechanisms for updating computer systems MD Marr, NR Potlapally US Patent 9,176,752, 2015 | 54 | 2015 |
| Detecting anomalous behavior in an electronic environment using hardware-based information NR Potlapally, DL BAILEY, R Weatherly US Patent 9,904,587, 2018 | 53 | 2018 |
| Remote attestation of host devices NR Potlapally, R Chawla, JR Volkman, MD Marr US Patent 9,619,238, 2017 | 53 | 2017 |
| Trusted computing host NR Potlapally, MD Marr, EJ Brandwine, DL BAILEY US Patent 9,147,086, 2015 | 53 | 2015 |
| Threat detection and mitigation through run-time introspection and instrumentation H Sultan, J Schweitzer, DL BAILEY, GB Roth, NR Potlapally US Patent 9,438,618, 2016 | 49 | 2016 |
| Power mode based macro-models for power estimation of electronic circuits A Raghunathan, G Lakshminarayana, N Potlapally, MS Hsiao, ... US Patent 6,735,744, 2004 | 46 | 2004 |