Author of the publication

On the Security and Vulnerability of PING.

, , and . WSS, volume 2194 of Lecture Notes in Computer Science, page 124-135. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification., , and . DSC, page 1-8. IEEE, (2021)Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions., , and . ISC2, page 1-8. IEEE, (2019)Textact: A text-action based web authentication scheme., and . GLOBECOM, page 955-960. IEEE, (2012)Fates: A Granular Approach to Real-Time Anomaly Detection., and . ICCCN, page 605-610. IEEE, (2007)Probabilistic treatment of service assurance in distributed information systems., and . DSC, page 318-325. IEEE, (2017)A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud., , and . ICPP Workshops, page 279-287. IEEE Computer Society, (2012)Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications., , and . ICDCS Workshops, page 362-367. IEEE Computer Society, (2013)PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers., , , and . INFOCOM, page 210-214. IEEE, (2013)Key Trees and the Security of Interval Multicast., , and . ICDCS, page 467-468. IEEE Computer Society, (2002)Investigation of 5G and 4G V2V Communication Channel Performance Under Severe Weather., , , , , , and . WiSEE, page 12-17. IEEE, (2022)