An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks | 0 | 0.34 | 2022 |
AI-Driven Selective Protection of Multimedia Data | 0 | 0.34 | 2021 |
Similarities and Learnings from Ancient Literature on Blockchain Consensus and Integrity | 0 | 0.34 | 2021 |
StackVault: Protection from Untrusted Functions | 0 | 0.34 | 2020 |
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. | 0 | 0.34 | 2019 |
How Secure Is Your IoT Network? | 0 | 0.34 | 2019 |
Malware Containment in Cloud | 0 | 0.34 | 2019 |
Data Transparency with Blockchain and AI Ethics. | 0 | 0.34 | 2019 |
Towards Deep Federated Defenses Against Malware in Cloud Ecosystems | 0 | 0.34 | 2019 |
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases. | 3 | 0.37 | 2018 |
Healthcare Informatics and Privacy. | 1 | 0.35 | 2018 |
A Trusted Healthcare Data Analytics Cloud Platform | 0 | 0.34 | 2018 |
Collaborative and Accountable Hardware Governance Using Blockchain | 0 | 0.34 | 2018 |
Research Directions in Blockchain Data Management and Analytics. | 0 | 0.34 | 2018 |
Principle of Need-to-Act. | 0 | 0.34 | 2017 |
Compliance-Aware Provisioning of Containers on Cloud | 0 | 0.34 | 2017 |
Energy Attacks on Mobile Devices | 0 | 0.34 | 2017 |
Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress). | 0 | 0.34 | 2017 |
Risk-Based Packet Routing For Privacy And Compliance-Preserving Sdn | 0 | 0.34 | 2017 |
Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud | 0 | 0.34 | 2016 |
Managing sensitive applications in the public cloud. | 1 | 0.41 | 2016 |
An Efficient Parallel Implementation of a Light-weight Data Privacy Method for Mobile Cloud Users. | 1 | 0.37 | 2016 |
Security of graph data: hashing schemes and definitions | 0 | 0.34 | 2014 |
Towards a Systematic Study of the Covert Channel Attacks in Smartphones. | 11 | 0.59 | 2014 |
Service Usage Metering in Hybrid Cloud Environments | 3 | 0.44 | 2014 |
Network-Level Access Control Management for the Cloud | 2 | 0.44 | 2013 |
Privacy-preserving authentication of trees and graphs | 12 | 0.52 | 2013 |
Towards Authenticated Objects. | 0 | 0.34 | 2013 |
Authentication of Data on Devices | 0 | 0.34 | 2012 |
On Hashing Graphs. | 0 | 0.34 | 2012 |
Efficient Leakage-free Authentication of Trees, Graphs and Forests. | 7 | 0.45 | 2012 |
Leakage-free redactable signatures | 8 | 0.45 | 2012 |
A New Class of Buffer Overflow Attacks | 1 | 0.35 | 2011 |
How to authenticate graphs without leaking | 17 | 0.66 | 2010 |
SN2K Attacks and Honest Services | 0 | 0.34 | 2009 |
A tree-covering problem arising in integrity of tree-structured data | 1 | 0.36 | 2008 |
A New Model for Secure Dissemination of XML Content | 12 | 0.63 | 2008 |
Structural signatures for tree data structures. | 0 | 0.34 | 2008 |
Structural signatures for tree data structures | 47 | 1.65 | 2008 |
Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors | 16 | 0.84 | 2008 |
Secure Dissemination of XML Content Using Structure-based Routing | 10 | 0.65 | 2006 |
Building applications using end to end composition of web services | 0 | 0.34 | 2005 |
A service creation environment based on end to end composition of Web services | 97 | 4.86 | 2005 |