Author of the publication

Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.

, , , , , and . Comput. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction., , , and . Comput. Networks, (April 2023)RouteChain: Towards Blockchain-based secure and efficient BGP routing., , , , , and . Comput. Networks, (2022)Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools., , , and . J. Netw. Comput. Appl., (2021)Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications., , , and . CoRR, (2022)Editorial., and . EAI Endorsed Trans. Security Safety, 6 (22): e1 (2020)Enriching Vulnerability Reports Through Automated and Augmented Description Summarization., and . CoRR, (2022)e-PoS: Making Proof-of-Stake Decentralized and Fair., , , , and . CoRR, (2021)Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description., , , and . CCS, page 3537-3539. ACM, (2023)Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality., , , and . CCS, page 988-1005. ACM, (2021)Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM., , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1049-1063 (2022)