Author of the publication

An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data.

, , , and . USENIX Security Symposium, USENIX Association, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure quality of service handling: SQoSH., , , , and . IEEE Commun. Mag., 38 (4): 106-112 (2000)Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks., , , and . ICOIN, volume 5200 of Lecture Notes in Computer Science, page 649-658. Springer, (2007)Your 80211 wireless network has no clothes., , , and . IEEE Wirel. Commun., 9 (6): 44-51 (2002)High-Performance MAC for High-Capacity Wireless LANs., , , and . ICCCN, page 167-172. IEEE, (2004)Automated Recovery in a Secure Bootstrap Process., , , and . NDSS, The Internet Society, (1998)Living with Insecurity., and . IEEE Secur. Priv., 9 (6): 12-13 (2011)he Real Risk of Digital Voting?. Computer, 37 (12): 124-125 (2004)Efficient Peer-to-Peer Lookup in Multi-hop Wireless Networks., and . KSII Trans. Internet Inf. Syst., 3 (1): 5-25 (2009)Safety and security of programmable network infrastructures., , , and . IEEE Commun. Mag., 36 (10): 84-92 (1998)Towards Scalable MAC Design for High-Speed Wireless LANs., , and . EURASIP J. Wirel. Commun. Netw., (2007)