Author of the publication

C Program Partitioning with Fine-Grained Security Constraints and Post-Partition Verification.

, , , , , and . MILCOM, page 285-291. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Short-term prediction of traffic flow using a binary neural network., , , , and . Neural Comput. Appl., 25 (7-8): 1639-1655 (2014)Scalable spectrum situational awareness using devices of opportunity., , , , , , , and . MILCOM, page 1-5. IEEE, (2012)An Overview of Opportunistic Routing in Mobile Ad Hoc Networks., and . MILCOM, page 119-124. IEEE, (2013)Smart Office Spaces., , , , , , and . USENIX Workshop on Embedded Systems, USENIX Association, (1999)Disconnection-resilient IP link-state routing for airborne networks., , , , , , and . MILCOM, page 1991-1996. IEEE, (2011)Opportunistic spectrum access: challenges, architecture, protocols., , , , , and . WICON, page 13. ACM, (2006)On Single-Server Delegation of RSA., , , , , , and . SecITC, volume 13809 of Lecture Notes in Computer Science, page 81-101. Springer, (2022)Optimization Algorithms for Large Self-Structuring Networks., , and . INFOCOM, page 71-78. IEEE Computer Society, (1999)SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security., , , , , , , , and . WCNC, page 49-54. IEEE, (2022)Single-Server Delegation of Small-Exponent Exponentiation from Quasilinear-Time Clients and Applications., , , and . CPSIOTSEC@CCS, page 15-26. ACM, (2022)