Author of the publication

Patient-centric authorization framework for electronic healthcare services.

, , , , and . Comput. Secur., 30 (2-3): 116-127 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)., , and . IJDSN, 12 (1): 2965438:1-2965438:3 (2016)Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches., , , , , , , , , and . IEEE/ACM Trans. Netw., 29 (4): 1509-1526 (2021)Efficient construction of provably secure steganography under ordinary covert channels., , , , and . Sci. China Inf. Sci., 55 (7): 1639-1649 (2012)Secure and efficient random functions with variable-length output., , , , and . J. Netw. Comput. Appl., (2014)Problematic Privacy Policies of Voice Assistant Applications., , , , and . IEEE Secur. Priv., 19 (6): 66-73 (2021)Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention., , , and . CoRR, (2017)Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities., , , , , and . CoRR, (2024)COVID-19 and Sinophobia: Detecting Warning Signs of Radicalization on Twitter and Reddit., , , , , and . Cyberpsychology Behav. Soc. Netw., 26 (7): 546-553 (July 2023)Dual-Level Knowledge Distillation via Knowledge Alignment and Correlation., , , , and . IEEE Trans. Neural Networks Learn. Syst., 35 (2): 2425-2435 (February 2024)An Investigation of Large Language Models for Real-World Hate Speech Detection., , , , , , and . ICMLA, page 1568-1573. IEEE, (2023)