Author of the publication

Assure High Quality Code Using Refactoring and Obfuscation Techniques.

, , , and . FCST, page 246-252. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Brief Survey on De-anonymization Attacks in Online Social Networks., , , and . CASoN, page 611-615. IEEE Computer Society, (2010)Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'., , , and . IEEE Trans. Information Forensics and Security, 11 (4): 868 (2016)AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption, , and . CoRR, (2012)PRIDE: A Private and Decentralized Usage-Based Insurance Using Blockchain., , and . iThings/GreenCom/CPSCom/SmartData, page 1349-1354. IEEE, (2018)A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT., , , , , and . INFOCOM, page 1493-1501. IEEE, (2018)Anonymous Secure Routing in Mobile Ad-Hoc Networks., , , , and . LCN, page 102-108. IEEE Computer Society, (2004)Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks., , and . INFOCOM, page 73-81. IEEE, (2012)From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks., , , , and . INFOCOM, page 334-342. IEEE, (2014)De-Anonymizing Dynamic Social Networks., , , and . GLOBECOM, page 1-6. IEEE, (2011)Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks., , , , and . MSN, page 457-464. IEEE Computer Society, (2009)