Author of the publication

IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

, , and . Sensors, 18 (2): 492 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations., , and . Sensors, 18 (2): 492 (2018)Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN., , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 163-180. Springer, (2012)A privacy-aware continuous authentication scheme for proximity-based access control., , and . Comput. Secur., (2013)Preserving Receiver-Location Privacy in Wireless Sensor Networks., , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 15-27. Springer, (2014)Probabilistic receiver-location privacy protection in wireless sensor networks., , and . Inf. Sci., (2015)Privacy-Aware Trust Negotiation., , and . STM, volume 9871 of Lecture Notes in Computer Science, page 98-105. Springer, (2016)Edge-Assisted Vehicular Networks Security., , , and . IEEE Internet of Things Journal, 6 (5): 8038-8045 (2019)HIDE_DHCP: Covert Communications through Network Configuration Messages., , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 162-173. Springer, (2012)Personal IoT Privacy Control at the Edge., , , and . IEEE Secur. Priv., 20 (1): 23-32 (2022)Privacy-aware digital forensics., , , , , , and . Security and Privacy for Big Data, Cloud Computing and Applications, Institution of Engineering and Technology, (2019)