Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a private vector space model for confidential documents., , and . SAC, page 944-945. ACM, (2013)LockDown: Balance Availability Attack against Lightning Network Channels., , , , and . IACR Cryptol. ePrint Arch., (2019)Towards efficient access control in a mobile agent based wireless sensor network., , , and . CRiSIS, page 1-4. IEEE Computer Society, (2012)Provenance and Privacy., , , and . MDAI, volume 10571 of Lecture Notes in Computer Science, page 3-11. Springer, (2017)LockDown: Balance Availability Attack Against Lightning Network Channels., , , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 245-263. Springer, (2020)Prevention of Cross-Site Scripting Attacks on Current Web Applications., and . OTM Conferences (2), volume 4804 of Lecture Notes in Computer Science, page 1770-1784. Springer, (2007)Fragment Transfer Protocol: An IEEE-FIPA based efficient transfer protocol for mobile agents., , , , , and . Comput. Commun., 33 (18): 2203-2214 (2010)A Survey on Cross-Site Scripting Attacks, and . CoRR, (2009)QR Steganography - A Threat to New Generation Electronic Voting Systems., , , , and . SECRYPT, page 484-491. SciTePress, (2014)Onion Routing in Deterministic Delay Tolerant Networks., and . FPS, volume 9482 of Lecture Notes in Computer Science, page 303-310. Springer, (2015)