Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust on Web Browser: Attack vs. Defense., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 241-253. Springer, (2003)Multi-stage Binary Code Obfuscation Using Improved Virtual Machine., , , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 168-181. Springer, (2011)Compliant encryption of jpeg2000 codestreanis., and . ICIP, page 3439-3442. IEEE, (2004)Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme., , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 171-183. Springer, (2007)Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream., , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 389-401. Springer, (2005)An Attack on SMC-Based Software Protection., , and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 352-368. Springer, (2006)Blocking Foxy Phishing Emails with Historical Information., , , and . ICC, page 1-5. IEEE, (2010)Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting.. ICASSP (2), page 13-16. IEEE, (2005)A Batch Authentication Protocol for V2G Communications., , , and . NTMS, page 1-5. IEEE, (2011)Remote tracking protocol with predictive localization algorithm., , , and . ICON, page 268-273. IEEE, (2012)