Author of the publication

SAFE: Secure and Big Data-Adaptive Framework for Efficient Cross-Domain Communication.

, , and . PSBD@CIKM, page 19-28. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DRBTS: Distributed Reputation-based Beacon Trust System., , and . DASC, page 277-283. IEEE Computer Society, (2006)VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins., and . IJSN, 13 (3): 153-168 (2018)Robust Authentication of Public Access Points Using Digital Certificates - A Novel Approach., and . CSS, volume 7672 of Lecture Notes in Computer Science, page 153-164. Springer, (2012)Towards a Reference Architecture for Service-Oriented Cross Domain Security Infrastructures., , and . IDCS, volume 8729 of Lecture Notes in Computer Science, page 275-284. Springer, (2014)Lightweight behavioral malware detection for windows platforms., , , and . MALWARE, page 75-81. IEEE Computer Society, (2017)Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss., , and . ICST Trans. Ambient Systems, 2 (5): e2 (2015)ERASE- entropy-based sanitization of sensitive data for privacy preservation., and . ICITST, page 427-432. IEEE, (2012)Duplicate File Names-A Novel Steganographic Data Hiding Technique., and . ACC (4), volume 193 of Communications in Computer and Information Science, page 260-268. Springer, (2011)Steganographic information hiding that exploits a novel file system vulnerability., , and . IJSN, 8 (2): 82-93 (2013)SecLoc - secure localization in WSNs using CDS.. Security and Communication Networks, 4 (7): 763-770 (2011)