Author of the publication

Information Processing and Security Analysis of Shared System Resource Based Architectures.

, and . Int. J. Cooperative Inf. Syst., 27 (4): 1850009:1-1850009:29 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Component assessment and proactive model for support of dynamic integration in self adaptive system., and . ACM SIGSOFT Softw. Eng. Notes, 34 (4): 1-9 (2009)Non Deterministic Pseudorandom Generator for Quantum Key Distribution., , , and . CoRR, (2023)Authentication of Electronic Control Unit using Arbiter Physical Unclonable Functions in Modern Automobiles., , , , and . ICTCS, page 112:1-112:9. (2016)Authentication of Trusted Platform Module Using Processor Response., and . SSCC, volume 467 of Communications in Computer and Information Science, page 325-334. Springer, (2014)LWR-based Quantum-Safe Pseudo-Random Number Generator., , and . J. Inf. Secur. Appl., (March 2023)Information Processing and Security Analysis of Shared System Resource Based Architectures., and . Int. J. Cooperative Inf. Syst., 27 (4): 1850009:1-1850009:29 (2018)Hardening web browser security configuration using machine learning technique., and . Int. J. Electron. Bus., 15 (3): 275-295 (2020)Quantitative analysis of information leakage in service-oriented architecture-based Web services., and . Kybernetes, 46 (3): 479-500 (2017)LWE based quantum-resistant pseudo-random number generator., and . Int. Arab J. Inf. Technol., 20 (6): 911-918 (2023)Dynamic adaptability with .NET service components., and . J. Object Technol., 9 (5): 75-94 (2010)