| 2009 |
| 9 | EE | Ashish Gehani,
Minyoung Kim,
Jian Zhang:
Steps Toward Managing Lineage Metadata in Grid Clusters.
Workshop on the Theory and Practice of Provenance 2009 |
| 2007 |
| 8 | EE | Ashish Gehani,
Ulf Lindqvist:
Bonsai: Balanced Lineage Authentication.
ACSAC 2007: 363-373 |
| 7 | EE | Surendar Chandra,
Ashish Gehani,
Xuwen Yu:
Automated Storage Reclamation Using Temporal Importance Annotations.
ICDCS 2007: 12 |
| 6 | EE | Ashish Gehani,
John H. Reif:
Super-Resolution Video Analysis for Forensic Investigations.
IFIP Int. Conf. Digital Forensics 2007: 281-299 |
| 2006 |
| 5 | EE | Ashish Gehani,
Surendar Chandra:
PAST: Probabilistic Authentication of Sensor Timestamps.
ACSAC 2006: 439-448 |
| 4 | EE | Ashish Gehani,
Surendar Chandra,
Gershon Kedem:
Augmenting storage with an intrusion response primitive to ensure the security of critical data.
ASIACCS 2006: 114-124 |
| 2005 |
| 3 | EE | Fareed Zaffar,
Gershon Kedem,
Ashish Gehani:
Paranoid: A Global Secure File Access Control System.
ACSAC 2005: 322-332 |
| 2004 |
| 2 | EE | Ashish Gehani,
Thomas H. LaBean,
John H. Reif:
DNA-based Cryptography.
Aspects of Molecular Computing 2004: 167-188 |
| 1 | EE | Ashish Gehani,
Gershon Kedem:
RheoStat: Real-Time Risk Management.
RAID 2004: 296-314 |