Author of the publication

vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.

, , , , and . ACM Conference on Computer and Communications Security, page 17-34. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ID-Based Signcryption with Restrictive Unsigncryption., , and . INCoS, page 485-489. IEEE, (2013)Leakage-Resilient Proxy Signatures., , , and . INCoS, page 495-502. IEEE, (2013)Vision-based Navigation of Autonomous Vehicle in Roadway Environments with Unexpected Hazards., , , and . CoRR, (2018)Ring Signatures of Constant Size Without Random Oracles., and . Inscrypt, volume 8957 of Lecture Notes in Computer Science, page 93-108. Springer, (2014)Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control., , , , , , and . SACMAT, page 129-131. ACM, (2017)On Zero Knowledge Argument with PQT Soundness., and . WISA, volume 9503 of Lecture Notes in Computer Science, page 326-335. Springer, (2015)A Note on Constant-Round Concurrent Zero-Knowledge Arguments of Knowledge for NP., , and . IDCS, volume 7646 of Lecture Notes in Computer Science, page 202-216. Springer, (2012)Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model., , , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 418-432. Springer, (2014)Performance considerations of network functions virtualization using containers., , , , , and . ICNC, page 1-7. IEEE Computer Society, (2016)Efficient Zero-Knowledge for NP from Secure Two-Party Computation., , and . IACR Cryptology ePrint Archive, (2019)