Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?., , , , , , , , and . Peer-to-Peer Computing, page 11-20. IEEE, (2009)Analysis and Design of E-voting Protocol., , and . SEC, volume 175 of IFIP Conference Proceedings, page 281-290. Kluwer, (2000)SecGuard: Secure and Practical Integrity Protection Model for Operating Systems., , , , , and . APWeb, volume 6612 of Lecture Notes in Computer Science, page 370-375. Springer, (2011)SpamClean: Towards Spam-Free Tagging Systems., , , and . CSE (4), page 429-435. IEEE Computer Society, (2009)Some issues regarding operating system security.. ICIS, page 1. IEEE Computer Society, (2014)A hash-TLB approach for MMU virtualization in xen/IA64., , , , , and . IPDPS, page 1-8. IEEE, (2008)A Way of Key Management in Cloud Storage Based on Trusted Computing., , , and . NPC, volume 6985 of Lecture Notes in Computer Science, page 135-145. Springer, (2011)A dynamic information flow model of secure systems., and . AsiaCCS, page 341-343. ACM, (2007)Applying NCP Logic to the Analysis of SSL 3.0., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 155-166. Springer, (2001)Square Attack on Reduced Camellia Cipher., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 238-245. Springer, (2001)