Author of the publication

Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.

, , , and . NBiS, page 355-360. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Encryption-Based Solution for Data Sovereignty in Federated Clouds., , and . IEEE Cloud Comput., 3 (1): 12-17 (2016)Healthcare-Related Data in the Cloud: Challenges and Opportunities., , , and . IEEE Cloud Comput., 3 (6): 10-14 (2016)A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy., , , , , and . Concurr. Comput. Pract. Exp., (2017)Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms., , and . Concurr. Comput. Pract. Exp., (2018)Human-Driven Edge Computing and Communication: Part 1., , , , , and . IEEE Commun. Mag., 55 (11): 70-71 (2017)Have you permission to answer this phone?, , , , and . IWBF, page 1-7. IEEE, (2018)Optimization of Score-Level Biometric Data Fusion by Constraint Construction Training., , , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 167-179. Springer, (2019)Towards the Design of a Covert Channel by Using Web Tracking Technologies., , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 231-246. Springer, (2019)Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner., , and . Comput. Secur., (2017)CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems., , , , , and . Inf. Sci., (2019)