Author of the publication

Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems.

, , , and . IEEE Trans. Dependable Sec. Comput., 9 (5): 741-755 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Indexing multimedia learning materials in ultimate course search., , , , , and . CBMI, page 1-6. IEEE, (2016)Collaborative Bluetooth-based location authentication on smart phones., , and . Pervasive and Mobile Computing, (2015)ILR: Improving Location Reliability in Mobile Crowd Sensing., , and . IJBDCN, 9 (4): 65-85 (2013)Remote data checking using provable data possession., , , , , , , and . ACM Trans. Inf. Syst. Secur., 14 (1): 12:1-12:34 (2011)Secure High-Throughput Multicast Routing in Wireless Mesh Networks., , and . IEEE Trans. Mob. Comput., 10 (5): 653-668 (2011)Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems., , and . CODASPY, page 281-288. ACM, (2015)Searchable symmetric encryption: improved definitions and efficient constructions., , , and . ACM Conference on Computer and Communications Security, page 79-88. ACM, (2006)Security of Wireless Mesh Networks (General Overview)., , and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Collaborative Offloading for Distributed Mobile-Cloud Apps., , , , , , and . MobileCloud, page 87-94. IEEE Computer Society, (2018)le-git-imate: Towards Verifiable Web-based Git Repositories., , , and . AsiaCCS, page 469-482. ACM, (2018)