Author of the publication

CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes.

, , , , and . ACM Trans. Cyber Phys. Syst., 5 (1): 3:1-3:34 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage., , , , and . EDBT, volume 261 of ACM International Conference Proceeding Series, page 710-714. ACM, (2008)Exploiting Data Sensitivity on Partitioned Data., , and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 274-299. Springer, (2018)Heuristics for Flash-Dissemination in Heterogenous Networks., , and . HiPC, volume 4297 of Lecture Notes in Computer Science, page 607-618. Springer, (2006)Ensuring Transaction Atomicity in Multidatabase Systems., , , , and . PODS, page 164-175. ACM Press, (1992)On Correctness of Non-serializable Executions., , , , and . PODS, page 97-108. ACM Press, (1993)Towards breaking the quality curse.: a web-querying approach to web people search., , and . SIGIR, page 27-34. ACM, (2008)CCD: Efficient Customized Content Dissemination in Distributed Publish/Subscribe., , , and . Middleware, volume 5896 of Lecture Notes in Computer Science, page 62-82. Springer, (2009)Middleware solutions for integrated simulation environments., , and . Middleware Doctoral Symposium, page 2-7. ACM, (2010)Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets., , , , and . EDBT, page 277-288. OpenProceedings.org, (2021)Enhancing cellular infrastructures: a reflective approach., , , and . ARM@Middleware, page 7-13. ACM, (2011)