Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Dewri, Rinku
add a person with the name Dewri, Rinku
 

Other publications of authors with the same name

Dynamic Security Risk Management Using Bayesian Attack Graphs., , and . IEEE Trans. Dependable Secur. Comput., 9 (1): 61-74 (2012)A Characterization of the Mass Surveillance Potential of Road Traffic Monitors., , , , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 3-23. Springer, (2018)A case study of black box fail-safe testing in web applications., , , and . J. Syst. Softw., (2017)Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system., , , , , , , , , and 6 other author(s). J. Parallel Distributed Comput., (2016)Towards achieving efficient access control of medical data with both forward and backward secrecy., , , and . Comput. Commun., (2022)POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice., , , and . CIKM, page 1037-1046. ACM, (2009)Leveraging Smartphone Advances for Continuous Location Privacy., , , and . MDM (1), page 197-202. IEEE Computer Society, (2015)Towards Optimal Multi-level Tiling for Stencil Computations., , , and . IPDPS, page 1-10. IEEE, (2007)Driving Habits Data: Location Privacy Implications and Solutions., , , , , , and . IEEE Secur. Priv., 15 (1): 12-20 (2017)Inferring trip destinations from driving habits data., , , and . WPES, page 267-272. ACM, (2013)