Author of the publication

Practical defenses against pollution attacks in wireless network coding.

, , and . ACM Trans. Inf. Syst. Secur., 14 (1): 7:1-7:31 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ILR: Improving Location Reliability in Mobile Crowd Sensing., , and . IJBDCN, 9 (4): 65-85 (2013)Collaborative Bluetooth-based location authentication on smart phones., , and . Pervasive and Mobile Computing, (2015)Indexing multimedia learning materials in ultimate course search., , , , , and . CBMI, page 1-6. IEEE, (2016)Remote data checking using provable data possession., , , , , , , and . ACM Trans. Inf. Syst. Secur., 14 (1): 12:1-12:34 (2011)Secure High-Throughput Multicast Routing in Wireless Mesh Networks., , and . IEEE Trans. Mob. Comput., 10 (5): 653-668 (2011)Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems., , and . CODASPY, page 281-288. ACM, (2015)Security of Wireless Mesh Networks (General Overview)., , and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Searchable symmetric encryption: improved definitions and efficient constructions., , , and . ACM Conference on Computer and Communications Security, page 79-88. ACM, (2006)Collaborative Offloading for Distributed Mobile-Cloud Apps., , , , , , and . MobileCloud, page 87-94. IEEE Computer Society, (2018)Auditable Version Control Systems., and . NDSS, The Internet Society, (2014)