Author of the publication

Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls.

, , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3837-3854 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A keyed-hashing based self-synchronization mechanism for port address hopping communication., , , and . Frontiers Inf. Technol. Electron. Eng., 18 (5): 719-728 (2017)Cooperative monitoring BGP among autonomous systems., , and . Secur. Commun. Networks, 8 (10): 1943-1957 (2015)VR-Cluster: Dynamic Migration for Resource Fragmentation Problem in Virtual Router Platform., , and . Sci. Program., (2016)The New Progress in the Research of Binary Vulnerability Exploits., , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 277-286. Springer, (2018)SDBGP: A scalable, distributed BGP routing protocol implementation., , , , and . HPSR, page 191-196. IEEE, (2011)Channel-Hopping-Based Communication Rendezvous in Cognitive Radio Networks., , , , , and . IEEE/ACM Trans. Netw., 22 (3): 889-902 (2014)Deep-Learning-Enabled Microwave-Induced Thermoacoustic Tomography Based on ResAttU-Net for Transcranial Brain Hemorrhage Detection., , , , , , and . IEEE Trans. Biomed. Eng., 70 (8): 2350-2361 (August 2023)Substitution Attacks Against Sigma Protocols., , , , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 192-208. Springer, (2022)Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls., , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3837-3854 (2022)An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center., , , and . TrustCom/ISPA/IUCC, page 1471-1477. IEEE Computer Society, (2013)