Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud., , and . ICPP Workshops, page 279-287. IEEE Computer Society, (2012)Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications., , and . ICDCS Workshops, page 362-367. IEEE Computer Society, (2013)Probabilistic treatment of service assurance in distributed information systems., and . DSC, page 318-325. IEEE, (2017)Fates: A Granular Approach to Real-Time Anomaly Detection., and . ICCCN, page 605-610. IEEE, (2007)Textact: A text-action based web authentication scheme., and . GLOBECOM, page 955-960. IEEE, (2012)Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions., , and . ISC2, page 1-8. IEEE, (2019)Investigation of 5G and 4G V2V Communication Channel Performance Under Severe Weather., , , , , , and . WiSEE, page 12-17. IEEE, (2022)Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification., , and . DSC, page 1-8. IEEE, (2021)Key Trees and the Security of Interval Multicast., , and . ICDCS, page 467-468. IEEE Computer Society, (2002)PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers., , , and . INFOCOM, page 210-214. IEEE, (2013)