Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Poolsappasit, Nayot
add a person with the name Poolsappasit, Nayot
 

Other publications of authors with the same name

Optimal security hardening on attack tree models of networks: a cost-benefit analysis., , , and . Int. J. Inf. Sec., 11 (3): 167-188 (2012)Towards a scalable model for location privacy., and . SPRINGL, page 46-51. ACM, (2008)Enhancing Internet Domain Name System Availability by Building Rings of Cooperation Among Cache Resolvers, and . 8th Annual IEEE SMC Information Assurance Workshop (IAW 2007), (June 2007)Dynamic Security Risk Management Using Bayesian Attack Graphs., , and . IEEE Trans. Dependable Secur. Comput., 9 (1): 61-74 (2012)Towards Achieving Personalized Privacy for Location-Based Services., and . Trans. Data Priv., 2 (1): 77-99 (2009)Trust Management of Encrypted Data Aggregation in a Sensor Network Environment., , and . MDM, page 157-166. IEEE Computer Society, (2012)An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems., , and . DBSec, volume 5094 of Lecture Notes in Computer Science, page 297-312. Springer, (2008)A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network., and . ICPP, page 138-147. IEEE Computer Society, (2011)ETIS - Efficient Trust and Identity Management System for Federated Service Providers., , and . AINA, page 219-226. IEEE Computer Society, (2013)Challenges in Secure Sensor-Cloud Computing., , , and . Secure Data Management, volume 6933 of Lecture Notes in Computer Science, page 70-84. Springer, (2011)