Author of the publication

A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services.

, , , and . MTD@CCS, page 59-68. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bezawada, Bruhadeshwar
add a person with the name Bezawada, Bruhadeshwar
 

Other publications of authors with the same name

Attribute-Based Encryption: Applications and Future Directions., and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 353-374. Springer, (2018)Cross-Domain Privacy-Preserving Cooperative Firewall Optimization., , and . IEEE/ACM Trans. Netw., 21 (3): 857-868 (2013)A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services., , , and . MTD@CCS, page 59-68. ACM, (2018)Balancing Revocation and Storage Trade-Offs in Secure Group Communication., and . IEEE Trans. Dependable Secur. Comput., 8 (1): 58-73 (2011)Behavioral fingerprinting of Internet-of-Things devices., , and . WIREs Data Mining Knowl. Discov., (2021)"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection., , , and . CNS, page 227-235. IEEE, (2021)MapperDroid: Verifying app capabilities from description to permissions and API calls., , , and . Comput. Secur., (2021)A template approach to group key establishment in dynamic ad-hoc groups., , , and . ICNP, page 1-2. IEEE Computer Society, (2016)Privacy Preserving String Matching for Cloud Computing., , , , and . ICDCS, page 609-618. IEEE Computer Society, (2015)Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough., , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 82-96. Springer, (2008)