Naveen Sastry
Naveen Sastry
Unknown affiliation
Verified email at
Cited by
Cited by
TinySec: a link layer security architecture for wireless sensor networks
C Karlof, N Sastry, D Wagner
Proceedings of the 2nd international conference on Embedded networked sensor …, 2004
Secure verification of location claims
N Sastry, U Shankar, D Wagner
Proceedings of the 2nd ACM workshop on Wireless security, 1-10, 2003
Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies
D Patterson, A Brown, P Broadwell, G Candea, M Chen, J Cutler, ...
Technical Report UCB//CSD-02-1175, UC Berkeley Computer Science, 2002
Security considerations for IEEE 802.15. 4 networks
N Sastry, D Wagner
Proceedings of the 3rd ACM workshop on Wireless security, 32-42, 2004
Cryptographic Voting Protocols: A Systems Perspective.
C Karlof, N Sastry, DA Wagner
USENIX Security Symposium 12, 39, 2005
Design and implementation of a sensor network system for vehicle tracking and autonomous interception.
C Sharp, S Schaffert, A Woo, N Sastry, C Karlof, S Sastry, DE Culler
EWSN, 93-107, 2005
Distillation codes and applications to DoS resistant multicast authentication
C Karlof, N Sastry, Y Li, A Perrig, JD Tygar
Proceedings of the ISOC Network and Distributed System Security Symposium, 37-56, 2004
Scrash: A system for generating secure crash information
P Broadwell, M Harren, N Sastry
12th USENIX Security Symposium (USENIX Security 03), 2003
FIG: A prototype tool for online verification of recovery mechanisms
P Broadwell, N Sastry, J Traupman
Workshop on Self-Healing, Adaptive and Self-Managed Systems, 2002
Verifiable functional purity in Java
M Finifter, A Mettler, N Sastry, D Wagner
Proceedings of the 15th ACM conference on Computer and communications …, 2008
TinySec: Link layer encryption for tiny devices
C Karlof, N Sastry, D Wagner
ACM SenSys, 3-5, 2004
Tamper-evident, history-independent, subliminal-free data structures on prom storage-or-how to store ballots on a voting machine
D Molnar, T Kohno, N Sastry, D Wagner
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-370, 2006
Recovery oriented computing (roc): Motivation, definition, techniques
D Patterson, A Brown, P Broadwell, G Candea, M Chen, J Cutler, ...
University of California at Berkeley, 2002
Fixing Races for Fun and Profit: How to Abuse atime.
N Borisov, R Johnson, N Sastry, D Wagner
USENIX Security Symposium, 2005
Security analysis of the Diebold AccuBasic interpreter
D Wagner, D Jefferson, M Bishop, C Karlof, N Sastry
Designing Voting Machines for Verification.
N Sastry, T Kohno, D Wagner
USENIX Security Symposium, 2006
Source code review of the Sequoia voting system
M Blaze, A Cordero, S Engle, C Karlof, N Sastry, M Sherr, T Stegers, ...
State of California’s Top to Bottom Review 2, 2007
Verifying security properties in electronic voting machines
NK Sastry
University of California, Berkeley, 2007
TinySec: User Manual
C Karlof, N Sastry, D Wagner
University of California, Berkeley, 2004
Security for sensor networks: Cryptography and beyond
D Wagner, C Karlof, D Molnar, N Sastry, U Shankar
URL: http://www. cs. berkeley. edu/daw/talks/SANS03. ppt, 2003
The system can't perform the operation now. Try again later.
Articles 1–20