Author of the publication

Reverse-safe authentication protocol for secure USB memories.

, , and . Secur. Commun. Networks, 5 (8): 834-845 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Slicing in the Presence of Unconstrained Pointers., , and . Symposium on Testing, Analysis, and Verification, page 60-73. ACM, (1991)Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords., , , , and . ACM Trans. Priv. Secur., 19 (3): 9:1-9:30 (2016)A Hypergame Analysis for ErsatzPasswords., , , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 47-61. Springer, (2018)Privacy and security - Answering the wrong questions is no answer.. Commun. ACM, 52 (6): 22-24 (2009)Enhancing Passwords Security Using Deceptive Covert Communication., , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 159-173. Springer, (2015)Edmund M. Clarke (1945 - 2020)., and . Commun. ACM, 64 (3): 23-24 (2021)Run-time label propagation for forensic audit data., and . Comput. Secur., 26 (7-8): 496-513 (2007)Authorship analysis: identifying the author of a program., and . Comput. Secur., 16 (3): 233-257 (1997)Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence., and . DFRWS, (2005)Applying Genetic Programming to Intrusion Detection, and . Working Notes for the AAAI Symposium on Genetic Programming, page 1--8. MIT, Cambridge, MA, USA, AAAI, (10--12 November 1995)