Follow
Avinash L Varna
Title
Cited by
Cited by
Year
Confidentiality-preserving rank-ordered search
A Swaminathan, Y Mao, GM Su, H Gou, AL Varna, S He, M Wu, DW Oard
Proceedings of the 2007 ACM workshop on Storage security and survivability, 7-12, 2007
2872007
Enabling search over encrypted multimedia databases
W Lu, A Swaminathan, AL Varna, M Wu
Media Forensics and Security 7254, 404-414, 2009
2542009
Secure image retrieval through feature protection
W Lu, AL Varna, A Swaminathan, M Wu
2009 IEEE International Conference on Acoustics, Speech and Signal …, 2009
1882009
“Seeing” ENF: power-signature-based timestamp for digital multimedia via optical sensing and signal processing
R Garg, AL Varna, A Hajj-Ahmad, M Wu
IEEE Transactions on Information Forensics and Security 8 (9), 1417-1432, 2013
1312013
Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization
W Lu, AL Varna, M Wu
IEEE Access 2, 125-141, 2014
1252014
An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks
R Garg, AL Varna, M Wu
IEEE transactions on information forensics and security 7 (2), 717-730, 2012
1032012
" Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing
R Garg, AL Varna, M Wu
Proceedings of the 19th ACM international conference on Multimedia, 23-32, 2011
862011
Secure video processing: Problems and challenges
W Lu, A Varna, M Wu
2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011
762011
Security analysis for privacy preserving search of multimedia
W Lu, AL Varna, M Wu
2010 IEEE International Conference on Image Processing, 2093-2096, 2010
732010
System and method for confidentiality-preserving rank-ordered search
A Swaminathan, Y Mao, GM Su, H Gou, AL Varna, S He, M Wu, DW Oard
US Patent App. 12/608,724, 2010
612010
Forensic hash for multimedia information
W Lu, AL Varna, M Wu
Media Forensics and Security II 7541, 349-358, 2010
552010
Modeling and analysis of electric network frequency signal for timestamp verification
R Garg, AL Varna, M Wu
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
492012
EM and power SCA-resilient AES-256 through> 350× current-domain signature attenuation and local lower metal routing
D Das, J Danial, A Golder, N Modak, S Maity, B Chatterjee, DH Seo, ...
IEEE Journal of Solid-State Circuits 56 (1), 136-150, 2020
482020
27.3 EM and power SCA-resilient AES-256 in 65nm cmos through> 350× current-domain signature attenuation
D Das, J Danial, A Golder, N Modak, S Maity, B Chatterjee, D Seo, ...
2020 IEEE International Solid-State Circuits Conference-(ISSCC), 424-426, 2020
472020
A decision theoretic framework for analyzing binary hash-based content identification systems
AL Varna, A Swaminathan, M Wu
Proceedings of the 8th ACM workshop on Digital rights management, 67-76, 2008
432008
Modeling and analysis of correlated binary fingerprints for content identification
AL Varna, M Wu
IEEE Transactions on Information Forensics and Security 6 (3), 1146-1159, 2011
372011
Gradient descent approach for secure localization in resource constrained wireless sensor networks
R Garg, AL Varna, M Wu
2010 IEEE International Conference on Acoustics, Speech and Signal …, 2010
312010
Data hiding in hard-copy text documents robust to print, scan and photocopy operations
AL Varna, S Rane, A Vetro
2009 IEEE International Conference on Acoustics, Speech and Signal …, 2009
262009
Fingerprinting compressed multimedia signals
AL Varna, S He, A Swaminathan, M Wu
IEEE Transactions on Information Forensics and Security 4 (3), 330-345, 2009
222009
Modeling and analysis of content identification
AL Varna, M Wu
2009 IEEE International Conference on Multimedia and Expo, 1528-1531, 2009
182009
The system can't perform the operation now. Try again later.
Articles 1–20