Author of the publication

Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes.

, , and . IEEE Trans. Dependable Secur. Comput., 8 (6): 824-838 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals., , and . IEEE Trans. Dependable Secur. Comput., 2 (3): 268-272 (2005)Clustering IoT Malware based on Binary Similarity., , , and . NOMS, page 1-6. IEEE, (2020)Extensions to an authentication technique proposed for the global mobility network., , , and . IEEE Trans. Commun., 48 (3): 373-376 (2000)Modelling adversaries and security objectives for routing protocols in wireless sensor networks., , and . SASN, page 49-58. ACM, (2006)Towards provable security for ad hoc routing protocols., and . SASN, page 94-105. ACM, (2004)Rational Exchange - A Formal Model Based on Game Theory., and . WELCOM, volume 2232 of Lecture Notes in Computer Science, page 114-126. Springer, (2001)Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality., , and . GameSec, volume 7638 of Lecture Notes in Computer Science, page 152-170. Springer, (2012)Mobility helps peer-to-peer security, , and . IEEE Transactions on Mobile Computing, 5 (1): 43-51 (January 2006)Rootkit Detection on Embedded IoT Devices., , , and . Acta Cybern., 25 (2): 369-400 (2021)Self-organization in mobile ad hoc networks: the approach of Terminodes., , , , , and . IEEE Commun. Mag., 39 (6): 166-174 (2001)