Author of the publication

Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.

, , , and . IEEE Trans. Vehicular Technology, 58 (4): 2018-2029 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incorporating Dynamic Constraints in the Flexible Authorization Framework., , and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 1-16. Springer, (2004)Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System., , , , and . CoRR, (2018)Memory Forensic Challenges Under Misused Architectural Features., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (9): 2345-2358 (2018)PCAM: A Data-driven Probabilistic Cyber-alert Management Framework., , , , , and . ACM Trans. Internet Techn., 22 (3): 67:1-67:24 (2022)Tracking anonymous peer-to-peer VoIP calls on the internet., , and . CCS, page 81-91. ACM, (2005)An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models., , , and . CIKM, page 4064-4068. ACM, (2022)An authorization model for query execution in the cloud., , , , , and . VLDB J., 31 (3): 555-579 (2022)A Unified Framework for Enforcing Multiple Access Control Policies., , , and . SIGMOD Conference, page 474-485. ACM Press, (1997)Threat Modeling for Cloud Data Center Infrastructures., , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 302-319. Springer, (2016)Database Security and Privacy.. The Computer Science and Engineering Handbook, CRC Press, (1997)