Author of the publication

SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox.

, , , , and . IEEE/ACM Trans. Netw., 25 (6): 3753-3766 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (2): 77:1-77:26 (2022)Disguised as Privacy: Data Poisoning Attacks Against Differentially Private Crowdsensing Systems., , , , , and . IEEE Trans. Mob. Comput., 22 (9): 5155-5169 (September 2023)Guest Editorial Special Issue on Security for IoT: The State of the Art., , , , and . IEEE Internet Things J., 1 (5): 369-371 (2014)A range characterization of the single-quadrant ADRT., , and . CoRR, (2020)Silent Two-party Computation Assisted by Semi-trusted Hardware., , , , and . IACR Cryptol. ePrint Arch., (2020)USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks., , and . IEEE Trans. Wirel. Commun., 11 (5): 1922-1932 (2012)Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks., , and . IEEE Trans. Wirel. Commun., 7 (1): 354-363 (2008)On Broadcast Authentication in Wireless Sensor Networks., , , and . IEEE Trans. Wirel. Commun., 6 (11): 4136-4144 (2007)Inverse transport calculations in optical imaging with subspace optimization algorithms., and . J. Comput. Phys., (2014)A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing., , , , , and . IEEE Trans. Inf. Forensics Secur., 11 (11): 2594-2608 (2016)