Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy enhanced access control in pervasive computing environments., and . BROADNETS, page 384-396. IEEE, (2005)Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing., , , , and . ESORICS, volume 5789 of Lecture Notes in Computer Science, page 355-370. Springer, (2009)Learning Saliency Maps for Adversarial Point-Cloud Generation., , , and . CoRR, (2018)PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones., , , , , and . IACR Cryptology ePrint Archive, (2013)Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks., , , and . IEEE Trans. Vehicular Technology, 65 (10): 8331-8344 (2016)Privacy-Preserving Public Auditing for Secure Cloud Storage., , , , and . IEEE Trans. Computers, 62 (2): 362-375 (2013)Secure and practical outsourcing of linear programming in cloud computing., , and . INFOCOM, page 820-828. IEEE, (2011)FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification., , and . INFOCOM, page 199-207. IEEE, (2019)LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks., , and . INFOCOM, IEEE, (2006)Security Challenges for the Public Cloud., , and . IEEE Internet Comput., 16 (1): 69-73 (2012)