Delegate: A proxy based architecture for secure website access from an untrusted machine RC Jammalamadaka, TW Van Der Horst, S Mehrotra, KE Seamons, ... 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 57-66, 2006 | 53 | 2006 |
Analyzing queries to generate product intention rules RC Jammalamadaka, N Chittar, SP Ghatare US Patent 8,515,966, 2013 | 39 | 2013 |
Flexible anonymization for privacy preserving data publishing: A systematic search based approach B Hore, RC Jammalamadaka, S Mehrotra Proceedings of the 2007 SIAM International Conference on Data Mining, 497-502, 2007 | 38 | 2007 |
Querying encrypted XML documents RC Jammalamadaka, S Mehrotra 2006 10th International Database Engineering and Applications Symposium …, 2006 | 33 | 2006 |
Mining product recommendation from query reformulations RC Jammalamadaka US Patent 8,566,339, 2013 | 26 | 2013 |
Pvault: a client server system providing mobile access to personal data RC Jammalamadaka, S Mehrotra, N Venkatasubramanian Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005 | 25 | 2005 |
iDataGuard: Middleware providing a secure network drive interface to untrusted internet data storage RC Jammalamadaka, R Gamboni, S Mehrotra, KE Seamons, ... Proceedings of the 11th international conference on Extending database …, 2008 | 20 | 2008 |
Systems and methods for data mining and automated generation of search query rewrites PS Kumar, P Arasada, RC Jammalamadaka US Patent 9,626,430, 2017 | 17 | 2017 |
gVault: A gmail based cryptographic network file system RC Jammalamadaka, R Gamboni, S Mehrotra, KE Seamons, ... Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working …, 2007 | 15 | 2007 |
iDataGuard: an interoperable security middleware for untrusted internet data storage RC Jammalamadaka, R Gamboni, S Mehrotra, K Seamons, ... Proceedings of the ACM/IFIP/USENIX Middleware'08 Conference Companion, 36-41, 2008 | 11 | 2008 |
Venkasubramanian Nalini. Delegate: A Proxy Based Architecture for Secure Web Access from an Untrusted Machine RC Jammalamadaka, TW van der Horst, S Mehrotra, KE Seamons 22nd Annual Computer Security Applications Conference, 2006 | 11 | 2006 |
Apparatus, system and method for string disambiguation and entity ranking GC Langmead, DJ Hughes, MA Gingrich, RC Jammalamadaka, ... US Patent 10,152,478, 2018 | 9 | 2018 |
A middleware approach for outsourcing data securely RC Jammalamadaka, R Gamboni, S Mehrotra, K Seamons, ... Computers & security 32, 252-266, 2013 | 8 | 2013 |
Systems and methods for representing search query rewrites PS Kumar, P Arasada, RC Jammalamadaka US Patent 9,727,607, 2017 | 7 | 2017 |
Systems and methods for data mining and automated generation of search query rewrites PS Kumar, P Arasada, RC Jammalamadaka US Patent 10,599,733, 2020 | 6 | 2020 |
Systems and methods for generating search query rewrites PS Kumar, P Arasada, RC Jammalamadaka US Patent 10,108,712, 2018 | 6 | 2018 |
Query expansion classifier for e-commerce RC Jammalamadaka, VK Salaka, BS Johnson, TH King US Patent 9,135,330, 2015 | 6 | 2015 |
Mining product recommendation from query reformulations RC Jammalamadaka US Patent 8,832,137, 2014 | 5 | 2014 |
A middleware approach for building secure network drives over untrusted internet data storage RC Jammalamadaka, R Gamboni, S Mehrotra, KE Seamons, ... Proc. ACM conference on Extending database technology: Advances in database …, 2008 | 5 | 2008 |
Mining product recommendation from query reformulations RC Jammalamadaka US Patent 9,189,810, 2015 | 4 | 2015 |