Author of the publication

SOLA: a one-bit identity authentication protocol for access control in IEEE 802.11.

, , , , , and . GLOBECOM, page 768-772. IEEE, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN., , and . Integrated Network Management, volume 246 of IFIP Conference Proceedings, page 231-244. Kluwer, (2003)Social Coordinates: A Scalable Embedding Framework for Online Social Networks., , and . ICMLSC, page 191-196. ACM, (2017)Mining User Deliberation and Bias in Online Newsgroups: A Dynamic View., , and . COSN, page 209-219. ACM, (2015)Sleepy Network-Layer Authentication Service for IPSEC.. ESORICS, volume 1146 of Lecture Notes in Computer Science, page 146-159. Springer, (1996)TCPtransform: Property-Oriented TCP Traffic Transformation., , , , , , and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 222-240. Springer, (2005)Analysis of user keyword similarity in online social networks, and . (2010)Localizing Temporal Anomalies in Large Evolving Graphs., , , and . SDM, page 927-935. SIAM, (2015)SOLA: a one-bit identity authentication protocol for access control in IEEE 802.11., , , , , and . GLOBECOM, page 768-772. IEEE, (2002)Intrusion Detection for an On-Going Attack., , , and . Recent Advances in Intrusion Detection, (1999)Triaging Anomalies in Dynamic Graphs: Towards Reducing False Positives., , , and . SmartCity, page 354-359. IEEE Computer Society, (2015)