Author of the publication

A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis.

, , and . ICC, page 1-5. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an Efficient Cyber-Physical System for First-Mile Taxi Transit in Urban Complex., , , , , , , and . HASE, page 9-16. IEEE, (2019)Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones., , , , , and . TrustCom, page 432-439. IEEE Computer Society, (2014)Static Integer Overflow Vulnerability Detection in Windows Binary., , , and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 19-35. Springer, (2013)Dynamic pricing at electric vehicle charging stations for waiting time reduction., , , , , and . ICCIP, page 204-211. ACM, (2018)Towards a Sustainable Incentive Mechanism for Participatory Sensing., , , and . IoTDI, page 49-60. IEEE Computer Society, (2016)Evaluating and comparing the quality of access control in different operating systems., , , , , and . Comput. Secur., (2014)Refining the Pointer Analysis by Exploiting Constraints on the CFL-Paths., , , , and . APSEC (1), page 17-24. IEEE Computer Society, (2013)978-1-4799-2143-0.Dynamic Pricing at Electric Vehicle Charging Stations for Queueing Delay Reduction., , , , and . ICDCS, page 2565-2566. IEEE Computer Society, (2017)Towards an Efficient and Real-Time Scheduling Platform for Mobile Charging Vehicles., , , , , , , and . ICA3PP (3), volume 11336 of Lecture Notes in Computer Science, page 402-416. Springer, (2018)A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis., , and . ICC, page 1-5. IEEE, (2011)