Author of the publication

An Effective Methodology for Measuring Software Resource Usage.

, , and . IEEE Trans. Instrumentation and Measurement, 67 (10): 2487-2494 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Interoperability in Multi-domain Enterprise Right Management Applications., and . ICISSP (Revised Selected Papers), volume 1221 of Communications in Computer and Information Science, page 382-402. Springer, (2019)iToken: aWireless smart card reader which provides handhelds with desk top equivalent security., , , , and . SecureComm, page 98-106. IEEE, (2007)Off-line enterprise rights management leveraging biometric key binding and secure hardware., , and . J. Ambient Intell. Humaniz. Comput., 10 (7): 2883-2894 (2019)A honeypot system with honeyword-driven fake interactive sessions., , and . HPCS, page 187-194. IEEE, (2015)Securing Operating System Services Based on Smart Cards., , , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 321-330. Springer, (2005)Secure Dependency Enforcement in Package Management Systems., , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 377-390 (2020)An Enterprise Rights Management System for On-the-Field Maintenance Facilities., , and . IEEE Access, (2020)SmartK: Smart cards in operating systems at kernel level., , , and . Inf. Secur. Tech. Rep., 17 (3): 93-104 (2013)On the Security of a Two-Factor Authentication Scheme., and . WISTP, volume 6033 of Lecture Notes in Computer Science, page 245-252. Springer, (2010)A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment., and . ICISSP, page 588-595. SciTePress, (2019)