Author of the publication

Context-Aware Service Modeling and Rule Evolution.

, , , , , and . IEEE WISA, page 71-75. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols., , , , and . J. Comput. Sci. Technol., 25 (2): 375-387 (2010)A holistic mechanism against file pollution in peer-to-peer networks., , , , , and . SAC, page 28-34. ACM, (2009)Identity-based encryption based on DHIES., , , , and . AsiaCCS, page 82-88. ACM, (2010)Sensitive Edges Protection in Social Networks., , , , , and . WAIM, volume 7923 of Lecture Notes in Computer Science, page 564-569. Springer, (2013)Modeling Context-aware Legal Computing with Bigraphs., , , , , and . SOSE, page 145-152. IEEE Computer Society, (2017)Vulnerabilities Scoring Approach for Cloud SaaS., , , and . UIC/ATC/ScalCom, page 1339-1347. IEEE Computer Society, (2015)Making Tagging Systems Resistant to Tricky Spam Attacks., , , and . UIC/ATC/ScalCom, page 871-879. IEEE Computer Society, (2015)SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks., , , , , , and . ICNS, page 296-302. IEEE Computer Society, (2009)Need for Symmetry: Addressing Privacy Risks in Online Social Networks., , , , , , and . AINA, page 534-541. IEEE Computer Society, (2011)An Adjacency Matrixes-Based Model for Network Security Analysis., , , , , and . ICC, page 1-5. IEEE, (2010)