Search results for: Shishir Nagaraja
Lecture Notes in Computer Science > Security and Privacy in Ad-hoc and Sensor Networks > Detection of Compromise, and Revocation > 232-246
Lecture Notes in Computer Science > Security Protocols > 329-332
Lecture Notes in Computer Science > Privacy Enhancing Technologies > Privacy Enhancing Technologies Symposium > 253-272
Journal of Computer Virology and Hacking Techniques > 2015 > 11 > 4 > 247-261