Author of the publication

Context-Based Access Control Systems for Mobile Devices.

, , and . IEEE Trans. Dependable Secur. Comput., 12 (2): 150-163 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leaving timing-channel fingerprints in hidden service log files., , and . Digit. Investig., 7 (Supplement): S104-S113 (2010)Context-Based Access Control Systems for Mobile Devices., , and . IEEE Trans. Dependable Secur. Comput., 12 (2): 150-163 (2015)Demonstrating a lightweight data provenance for sensor networks., , , and . CCS, page 1022-1024. ACM, (2012)Demo Overview: Privacy-Enhancing Features of IdentiDroid., , , and . ACM Conference on Computer and Communications Security, page 1481-1483. ACM, (2014)Enhancing malware detection: clients deserve more protection., and . Int. J. Electron. Secur. Digit. Forensics, 8 (1): 1-16 (2016)Performance signatures of mobile phone browsers., , and . ACM Conference on Computer and Communications Security, page 1407-1410. ACM, (2013)A comparative study of ElGamal based digital signature algorithms., , and . J. Comput. Methods Sci. Eng., 6 (5-6): 147-156 (2006)Fine-grained analysis of packet loss symptoms in wireless sensor networks., , and . SenSys, page 38:1-38:2. ACM, (2013)PostgreSQL anomalous query detector., , , and . EDBT, page 741-744. ACM, (2013)Fine-grained analysis of packet losses in wireless sensor networks., , and . SECON, page 320-328. IEEE, (2014)