Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Composite Privacy Leakage Indicator., and . Wireless Personal Communications, 61 (3): 511-526 (2011)Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage.. IDAACS, page 820-823. IEEE, (2019)A Novel Framework for Security Enforcement in Networks for Disaster and Crisis Management.. ISCRAM, ISCRAM Association, (2016)Spatio-temporal exposure control., and . PIMRC, page 2760-2764. IEEE, (2003)Towards a Probabilistic Framework for Analogous Multi-Modal Human-Computer Interaction., , and . HCI (4), page 1407-1411. Lawrence Erlbaum, (2003)Collaborative assessment of information provider's reliability and expertise using subjective logic., , and . CollaborateCom, page 352-361. ICST / IEEE, (2011)A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing., and . CIC, page 46-53. IEEE Computer Society, (2016)Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther., , and . PDP, page 553-557. IEEE Computer Society, (2016)SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs., , , and . LCN, page 271-274. IEEE Computer Society, (2011)Secure Group Communication Using Fractional Public Keys., and . ARES, page 254-257. IEEE Computer Society, (2010)