Author of the publication

Cross-Domain Privacy-Preserving Cooperative Firewall Optimization.

, , and . IEEE/ACM Trans. Netw., 21 (3): 857-868 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bruhadeshwar, Bezawada
add a person with the name Bruhadeshwar, Bezawada
 

Other publications of authors with the same name

Rekeying and Storage Cost for Multiple User Revocation., and . NDSS, The Internet Society, (2005)A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks., and . AINA Workshops, page 291-296. IEEE Computer Society, (2013)An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System., and . J. Medical Systems, 37 (5): 9969 (2013)AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement., , and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 23-42. Springer, (2019)History-Based Throttling of Distributed Denial-of-Service Attacks., , , and . ICETE (Selected Papers), volume 990 of Communications in Computer and Information Science, page 199-223. Springer, (2017)Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough., , and . ESORICS, volume 5283 of Lecture Notes in Computer Science, page 82-96. Springer, (2008)Behavioral Fingerprinting of IoT Devices., , , , , and . ASHES@CCS, page 41-50. ACM, (2018)Distributing Key Updates in Secure Dynamic Groups., and . ICDCIT, volume 3347 of Lecture Notes in Computer Science, page 410-419. Springer, (2004)Signature Generation and Detection of Malware Families., , and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 336-349. Springer, (2008)FormatShield: A Binary Rewriting Defense against Format String Attacks., and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 376-390. Springer, (2008)