2009 |
9 | EE | Ashish Gehani,
Minyoung Kim,
Jian Zhang:
Steps Toward Managing Lineage Metadata in Grid Clusters.
Workshop on the Theory and Practice of Provenance 2009 |
2007 |
8 | EE | Ashish Gehani,
Ulf Lindqvist:
Bonsai: Balanced Lineage Authentication.
ACSAC 2007: 363-373 |
7 | EE | Surendar Chandra,
Ashish Gehani,
Xuwen Yu:
Automated Storage Reclamation Using Temporal Importance Annotations.
ICDCS 2007: 12 |
6 | EE | Ashish Gehani,
John H. Reif:
Super-Resolution Video Analysis for Forensic Investigations.
IFIP Int. Conf. Digital Forensics 2007: 281-299 |
2006 |
5 | EE | Ashish Gehani,
Surendar Chandra:
PAST: Probabilistic Authentication of Sensor Timestamps.
ACSAC 2006: 439-448 |
4 | EE | Ashish Gehani,
Surendar Chandra,
Gershon Kedem:
Augmenting storage with an intrusion response primitive to ensure the security of critical data.
ASIACCS 2006: 114-124 |
2005 |
3 | EE | Fareed Zaffar,
Gershon Kedem,
Ashish Gehani:
Paranoid: A Global Secure File Access Control System.
ACSAC 2005: 322-332 |
2004 |
2 | EE | Ashish Gehani,
Thomas H. LaBean,
John H. Reif:
DNA-based Cryptography.
Aspects of Molecular Computing 2004: 167-188 |
1 | EE | Ashish Gehani,
Gershon Kedem:
RheoStat: Real-Time Risk Management.
RAID 2004: 296-314 |