Author of the publication

Revisiting challenges for selective data protection of real applications.

, , , , , , , and . APSys, page 138-145. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks., , , and . IEEE Trans. Vehicular Technology, 65 (10): 8331-8344 (2016)LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks., , and . INFOCOM, IEEE, (2006)Secure and practical outsourcing of linear programming in cloud computing., , and . INFOCOM, page 820-828. IEEE, (2011)Security Challenges for the Public Cloud., , and . IEEE Internet Comput., 16 (1): 69-73 (2012)Toward Secure and Dependable Storage Services in Cloud Computing., , , , and . IEEE Trans. Serv. Comput., 5 (2): 220-232 (2012)Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels., , and . IEEE J. Sel. Areas Commun., 30 (9): 1666-1674 (2012)Data security and privacy in wireless body area networks., , and . IEEE Wirel. Commun., 17 (1): 51-58 (2010)Injecting Reliable Radio Frequency Fingerprints Using Metasurface for The Internet of Things., , , and . CoRR, (2020)Frequency Domain Optical Tomography Based on the Equation of Radiative Transfer., , and . SIAM J. Sci. Comput., 28 (4): 1463-1489 (2006)A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)