Author of the publication

On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing.

, , and . SecureComm, page 157-170. IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A semantics aware approach to automated reverse engineering unknown protocols., , , , , , , , and . ICNP, page 1-10. IEEE Computer Society, (2012)Identifying Mobile Inter-App Communication Risks., , , , and . IEEE Trans. Mob. Comput., 19 (1): 90-102 (2020)Deep Phenotyping of Non-Alcoholic Fatty Liver Disease Patients with Genetic Factors for Insights into the Complex Disease., , , , , , , and . CoRR, (2023)Industrial Strength Static Detection for Cryptographic API Misuses., , , , , and . SecDev, page 61-62. IEEE, (2022)OMOS: A Framework for Secure Communication in Mashup Applications., , and . ACSAC, page 355-364. IEEE Computer Society, (2008)Program Analysis of Cryptographic Implementations for Security., and . SecDev, page 61-68. IEEE Computer Society, (2017)A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity., , , and . DSN, page 467-478. IEEE Computer Society, (2016)On Threat Modeling and Mitigation of Medical Cyber-Physical Systems., , , and . CHASE, page 114-119. IEEE Computer Society / ACM, (2017)Efficient signature schemes supporting redaction, pseudonymization, and data deidentification., , , , , , , and . AsiaCCS, page 353-362. ACM, (2008)The union-split algorithm and cluster-based anonymization of social networks., and . AsiaCCS, page 218-227. ACM, (2009)