Author of the publication

Scaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing.

, , , and . J. Inf. Secur. Appl., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bezawada, Bruhadeshwar
add a person with the name Bezawada, Bruhadeshwar
 

Other publications of authors with the same name

Balancing Revocation and Storage Trade-Offs in Secure Group Communication., and . IEEE Trans. Dependable Secur. Comput., 8 (1): 58-73 (2011)A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services., , , and . MTD@CCS, page 59-68. ACM, (2018)Attribute-Based Encryption: Applications and Future Directions., and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 353-374. Springer, (2018)Cross-Domain Privacy-Preserving Cooperative Firewall Optimization., , and . IEEE/ACM Trans. Netw., 21 (3): 857-868 (2013)Behavioral fingerprinting of Internet-of-Things devices., , and . WIREs Data Mining Knowl. Discov., (2021)MapperDroid: Verifying app capabilities from description to permissions and API calls., , , and . Comput. Secur., (2021)"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection., , , and . CNS, page 227-235. IEEE, (2021)A template approach to group key establishment in dynamic ad-hoc groups., , , and . ICNP, page 1-2. IEEE Computer Society, (2016)Privacy Preserving String Matching for Cloud Computing., , , , and . ICDCS, page 609-618. IEEE Computer Society, (2015)Scaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing., , , and . J. Inf. Secur. Appl., (2021)