Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia
In the proceedings of Computer Security Foundations Symposium (CSF), 2017 IEEE 30th, 360-375.
2. The Security of NTP's Datagram Protocol.
Aanchal Malhotra, Matthew V. Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg
In the proceedings of 21st International Conference on Financial Cryptography and Data Security (FC), Malta. 405-423, February 2017. news
3. Attacking NTP's Authenticated Broadcast Mode.
Aanchal Malhotra, Sharon Goldberg
ACM SIGCOMM Computer Communication Review, April 2016 issue.
4. Attacking the Network Time Protocol.
Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, Sharon Goldberg
In the proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California. 21-24 February, 2016.
5. Practical IBE Secure under CBDH - Encrypting Without Pairing.
S. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra, C. Pandu Rangan
In the Proceedings of the 12th International Conference on Security and Cryptography, 251-258, 2015, Colmar, Alsace, France.
6. RPKI vs ROVER: Comparing the Risks of BGP Security Solutions.
Aanchal Malhotra, Sharon Goldberg
Poster in the proceedings of ACM conference on SIGCOMM 2014 113-4. Full version
7. Pattern Recognition Approaches Inspired by Artificial Immune System.
Aanchal Malhotra, Abhishek Baheti, Shilpi Gupta
In International Journal of Computing Applications 44(20):12-16 (2012).
8. Responsiveness of Academics to emails: India versus the West.
Abhishek Sharma, Aanchal Malhotra, Prachi Sharma
In Current Science 102 (1): 9-10 (2012).
9. Enhancing Security based on Feedback Mechanism in Neural Cryptography.
Srivinay, Aanchal Malhotra
In the proceedings of International Conference on Computer Science and Information Technology, Bengaluru, India (2010).