Author of the publication

Secure Cloud Browser: Model and Architecture to Support Secure WEB Navigation.

, , , , , and . SRDS, page 402-403. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Di Liu University of Stuttgart

Data for: The silicon vacancy centers in SiC: determination of intrinsic spin dynamics for integrated quantum photonics. Dataset, (2024)Related to: Di Liu, Florian Kaiser, Vladislav Bushmakin, Erik Hesselmeier, Timo Steidl, Takeshi Ohshima, Nguyen Tien Son, Jawad Ul-Hassan, Öney O. Soykal, Jörg Wrachtrup (2023). The silicon vacancy centers in SiC: determination of intrinsic spin dynamics for integrated quantum photonics. arXiv preprint. arXiv: 2307.13648.
 

Other publications of authors with the same name

CloRExPa: Cloud resilience via execution path analysis., , and . Future Generation Comp. Syst., (2014)Events privacy in WSNs: A new model and its application., , , and . WOWMOM, page 1-9. IEEE Computer Society, (2011)Confidentiality and availability issues in Mobile Unattended Wireless Sensor Networks., and . WOWMOM, page 1-6. IEEE Computer Society, (2013)A Reliable Key Authentication Schema for Secure Multicast Communications., , and . SRDS, page 231-240. IEEE Computer Society, (2003)Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions., , and . SRDS, page 213-218. IEEE Computer Society, (2012)POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks., , , and . SRDS, page 185-194. IEEE Computer Society, (2008)A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions., , and . ICMB, page 28-34. IEEE Computer Society, (2005)Sensor Networks that Are Provably Resilient., , , , and . SecureComm, page 1-10. IEEE, (2006)CURE - Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments., , and . Computer Communications, (2016)Mobility and Cooperation to Thwart Node Capture Attacks in MANETs., , , and . EURASIP J. Wireless Comm. and Networking, (2009)