Analysis of SEAndroid Policies: Combining MAC and DAC in Android. | 2 | 0.41 | 2017 |
Towards quantification of firewall policy complexity | 0 | 0.34 | 2015 |
On practical specification and enforcement of obligations | 12 | 0.66 | 2012 |
On XACML's adequacy to specify and to enforce HIPAA | 5 | 0.45 | 2012 |
The Calibrating Method of Frame-transfer Type CCD Image Smearing | 0 | 0.34 | 2010 |
Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia | 1 | 0.45 | 2010 |
The Detecting Methods of Geostationary Orbit Objects | 0 | 0.34 | 2010 |
Bargain-based Stimulation Mechanism for Selfish Mobile Nodes in Participatory Sensing Network | 29 | 1.24 | 2009 |
A queuing model-based incentive scheme for optimal data transmission in wireless networks with selfish nodes | 1 | 0.38 | 2008 |
Minimum-Cost Data Delivery in Heterogeneous Wireless Networks | 7 | 0.48 | 2007 |