Author of the publication

RBWA: an efficient random-bit window-based authentication protocol.

, , , , and . GLOBECOM, page 1379-1383. IEEE, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Do we really need to catch them all? A new User-guided Social Media Crawling method., , , and . CoRR, (2016)Governing AI safety through independent audits., , , , , , , , , and 10 other author(s). Nat. Mach. Intell., 3 (7): 566-571 (2021)SIN: A Platform to Make Interactions in Social Networks Accessible., , , , , and . SocialInformatics, page 205-214. IEEE Computer Society, (2012)A Socially-Aware Operating System for Trustworthy Computing., , , , , and . ICSC, page 380-386. IEEE Computer Society, (2011)Read What You Trust: An Open Wiki Model Enhanced by Social Context., , , , and . SocialCom/PASSAT, page 370-379. IEEE Computer Society, (2011)Leveraging Social Interactions to Suggest Friends., , , and . ICDCS Workshops, page 386-391. IEEE Computer Society, (2013)A Cloud Theory-Based Trust Computing Model in Social Networks., , , , and . Entropy, 19 (1): 11 (2017)SOLA: a one-bit identity authentication protocol for access control in IEEE 802.11., , , , , and . GLOBECOM, page 768-772. IEEE, (2002)TCPtransform: Property-Oriented TCP Traffic Transformation., , , , , , and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 222-240. Springer, (2005)Measuring profile distance in online social networks., and . WIMS, page 47. ACM, (2011)