Author of the publication

GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.

, , , and . J. Comput. Secur., 14 (4): 301-325 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Alert Data Management Processes at a Cyber Security Operations Center., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors., , , and . Serv. Oriented Comput. Appl., 12 (2): 123-135 (2018)Polyinstantation for Cover Stories., and . ESORICS, volume 648 of Lecture Notes in Computer Science, page 307-328. Springer, (1992)Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks., , , and . CoRR, (2020)Globally Consistent Event Ordering in One-Directional Distributed Environments., , and . IEEE Trans. Parallel Distributed Syst., 7 (6): 665-670 (1996)Understanding the Manipulation on Recommender Systems through Web Injection., , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Consistency and enforcement of access rules in cooperative data sharing environment., , and . Comput. Secur., (2014)Model-Driven Development for secure information systems., , , and . Inf. Softw. Technol., 51 (5): 809-814 (2009)Intrusion Confinement by Isolation in Information Systems., , and . J. Comput. Secur., 8 (4): 243-279 (2000)A Semantic-Based Transaction Processing Model for Multilevel Transactions., , and . J. Comput. Secur., 6 (3): 181-217 (1998)