Author of the publication

Automatic construction of jump-oriented programming shellcode (on the x86).

, , , , , and . AsiaCCS, page 20-29. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs., , and . HPCC/SmartCity/DSS, page 1763-1770. IEEE, (2019)Fluent: Round-efficient Secure Aggregation for Private Federated Learning., , , , , and . CoRR, (2024)A Message-Oriented Message Dissemination and Authentication Scheme for Vehicular Ad Hoc Networks., , and . ISPA/BDCloud/SocialCom/SustainCom, page 223-228. IEEE, (2019)IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program., , , , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 336-345. Springer, (2009)ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings., , and . ISECS, page 179-183. IEEE Computer Society, (2008)A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks., , and . CIS, page 625-629. IEEE Computer Society, (2011)Trustworthy Announcement Dissemination Scheme With Blockchain-Assisted Vehicular Cloud., , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 1786-1800 (February 2023)LORP: a load-balancing based optimal routing protocol for sensor networks with bottlenecks., , , , and . WCNC, page 2438-2443. IEEE, (2009)Reliable Transmission with Multipath and Redundancy for Wireless Mesh Networks., , , , and . ICA3PP (1), volume 8630 of Lecture Notes in Computer Science, page 755-767. Springer, (2014)Attribute-Based Encryption with Efficient Keyword Search and User Revocation., , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 490-509. Springer, (2018)