[go: up one dir, main page]

Follow
Nachiketh Potlapally
Nachiketh Potlapally
Oracle (ex-AWS, ex-Intel), PhD (CSE, Princeton University)
Verified email at alumni.princeton.edu
Title
Cited by
Cited by
Year
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
NR Potlapally, S Ravi, A Raghunathan, NK Jha
IEEE Transactions on mobile computing 5 (2), 128-143, 2005
5812005
Analyzing the energy consumption of security protocols
NR Potlapally, S Ravi, A Raghunathan, NK Jha
Proceedings of the 2003 international symposium on Low power electronics and …, 2003
4162003
Optimizing public-key encryption for wireless clients
NR Potlapally, S Ravi, A Raghunathan, G Lakshminarayana
2002 IEEE International Conference on Communications. Conference Proceedings …, 2002
2852002
Threat detection and mitigation through run-time introspection and instrumentation
H Sultan, J Schweitzer, DL BAILEY, GB Roth, NR Potlapally
US Patent 9,876,815, 2018
1602018
Hardware mechanisms for memory authentication: A survey of existing techniques and engines
R Elbaz, D Champagne, C Gebotys, RB Lee, N Potlapally, L Torres
Transactions on Computational Science IV: Special Issue on Security in …, 2009
1352009
Securing wireless data: System architecture challenges
S Ravi, A Raghunathan, N Potlapally
Proceedings of the 15th international symposium on System Synthesis, 195-200, 2002
1302002
Allocating processor resources based on a service-level agreement
RG Patel, NR Potlapally, WJ Earl
US Patent 9,864,636, 2018
1012018
System design methodologies for a wireless security processing platform
S Ravi, A Raghunathan, N Potlapally, M Sankaradass
Proceedings of the 39th annual Design Automation Conference, 777-782, 2002
1012002
Techniques for efficient security processing
A Raghunathan, S Ravi, N Potlapally, S Chakradhar, M Sankaradas
US Patent App. 10/259,569, 2003
962003
Allocating processor resources based on a task identifier
RG Patel, WJ Earl, NR Potlapally
US Patent 9,491,112, 2016
772016
Hardware security in practice: Challenges and opportunities
N Potlapally
2011 IEEE International Symposium on Hardware-Oriented Security and Trust, 93-98, 2011
732011
Detecting unauthorized websites
BL Speegle, NR Potlapally
US Patent 8,943,588, 2015
712015
Securing client-specified credentials at cryptographically attested resources
NR Potlapally, AJ Doane, EJ Brandwine, RE Fitzgerald
US Patent 10,389,709, 2019
672019
Datacenter power management optimizations
NR Potlapally, JR Hamilton
US Patent 9,557,792, 2017
672017
Hardware-based mechanisms for updating computer systems
MD Marr, NR Potlapally
US Patent 9,176,752, 2015
542015
Detecting anomalous behavior in an electronic environment using hardware-based information
NR Potlapally, DL BAILEY, R Weatherly
US Patent 9,904,587, 2018
532018
Remote attestation of host devices
NR Potlapally, R Chawla, JR Volkman, MD Marr
US Patent 9,619,238, 2017
532017
Trusted computing host
NR Potlapally, MD Marr, EJ Brandwine, DL BAILEY
US Patent 9,147,086, 2015
532015
Threat detection and mitigation through run-time introspection and instrumentation
H Sultan, J Schweitzer, DL BAILEY, GB Roth, NR Potlapally
US Patent 9,438,618, 2016
492016
Power mode based macro-models for power estimation of electronic circuits
A Raghunathan, G Lakshminarayana, N Potlapally, MS Hsiao, ...
US Patent 6,735,744, 2004
462004
The system can't perform the operation now. Try again later.
Articles 1–20