Author of the publication

Providing witness anonymity under peer-to-peer settings.

, , , and . IEEE Trans. Inf. Forensics Secur., 5 (2): 324-336 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Processor Scheduling on Multiprogrammed, Distributed Memory Parallel Computers., , and . SIGMETRICS, page 158-170. ACM, (1993)DyRecT: Software Support for Adaptive Parallelism on NOWs., , and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 1168-1175. Springer, (2000)An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks., , , and . S&P, page 259-271. IEEE Computer Society, (2004)GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks., , , and . MobiQuitous, page 42-51. IEEE Computer Society, (2004)Trace-driven Analysis of Migration-based Gang Scheduling Policies for Parallel Computers.. ICPP, page 489-492. IEEE Computer Society, (1997)A Parallel Solution to the Cutting Stock Problem for a Cluster of Workstations., , , and . HPDC, page 521-530. IEEE Computer Society, (1996)Securing Topology Maintenance Protocols for Sensor Networks., , , and . IEEE Trans. Dependable Secur. Comput., 8 (3): 450-465 (2011)A Fair Locking Protocol for Multilevel Secure Databases., , and . CSFW, page 168-178. IEEE Computer Society, (1998)A Comparative Analysis of Static Processor Partitioning Policies for Parallel Computers., and . MASCOTS, page 283-286. The Society for Computer Simulation, (1993)Using Idle Memory for Data-Intensive Computations (Extended Abstract)., and . SIGMETRICS, page 278-279. ACM, (1998)