Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Misuse of RC4 in Microsoft Word and Excel.. IACR Cryptology ePrint Archive, (2005)Related-Cipher Attacks.. ICICS, volume 2513 of Lecture Notes in Computer Science, page 447-455. Springer, (2002)Cryptanalysis of the Stream Cipher ABC v2., and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 56-66. Springer, (2006)URFDS: Systematic discovery of Unvalidated Redirects and Forwards in web applications., and . CNS, page 697-698. IEEE, (2015)W-ART: Action Relation Transformer for Weakly-Supervised Temporal Action Localization., , , , , and . ICASSP, page 2195-2199. IEEE, (2022)Transtl: Spatial-Temporal Localization Transformer for Multi-Label Video Classification., , , , , and . ICASSP, page 1965-1969. IEEE, (2022)Worst-Case Analysis is Maximum-A-Posteriori Estimation., and . CoRR, (2023)An Intelligent Scheduling Access Privacy Protection Model of Electric Vehicle Based on 5G-V2X., , , , , and . Sci. Program., (2021)Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (4): 1667-1680 (2021)Resynchronization Attacks on WG and LEX., and . FSE, volume 4047 of Lecture Notes in Computer Science, page 422-432. Springer, (2006)