Author of the publication

Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications.

, , , and . SocialCom/PASSAT, page 41-48. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preserving User Privacy in Pervasive Environments with a Collaborative Model., , , and . SERE (Companion), page 84-93. IEEE, (2013)Automated Adversarial Testing of Unmodified Wireless Routing Implementations., , , , and . IEEE/ACM Trans. Netw., 24 (6): 3369-3382 (2016)Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms., , , and . SACMAT, page 61-72. ACM, (2019)Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations., , , , and . ICDCS, page 660-669. IEEE Computer Society, (2014)A formal security analysis of ZigBee (1.0 and 3.0)., , and . HotSoS, page 12:1-12:11. ACM, (2020)Taming epidemic outbreaks in mobile adhoc networks., , , , and . Ad Hoc Networks, (2015)Supporting recovery, privacy and security in RFID systems using a robust authentication protocol., , and . SAC, page 1062-1066. ACM, (2009)Network (In)security: Leniency in Protocols' Design, Code and Configuration.. SACMAT, page 5-6. ACM, (2022)Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis., and . SecDev, page 138-145. IEEE Computer Society, (2016)Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications., , , and . SocialCom/PASSAT, page 41-48. IEEE Computer Society, (2010)