Author of the publication

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks.

, , and . IEEE Trans. Parallel Distributed Syst., 27 (2): 405-418 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices., , , and . IEEE Trans. Mob. Comput., 17 (4): 927-944 (2018)5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol., , , , and . ACM Conference on Computer and Communications Security, page 669-684. ACM, (2019)Insecure connection bootstrapping in cellular networks: the root of all evil., , , , and . WiSec, page 1-11. ACM, (2019)Seamless and Secure Bluetooth LE Connection Migration., , , and . CODASPY, page 147-149. ACM, (2017)SAAMAN: Scalable Address Autoconfiguration in Mobile Ad Hoc Networks., , and . J. Netw. Syst. Manag., 19 (3): 394-426 (2011)Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices., , , , , , , and . CoRR, (2022)Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways., , and . DCOSS, page 66-73. IEEE, (2019)Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications., , , , , , , , , and 1 other author(s). CoRR, (2023)Building a Privacy-Preserving Smart Camera System., , , , , , , and . CoRR, (2022)Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations., , , , and . AsiaCCS, page 501-515. ACM, (2021)