From post

On the Feasibility of Malware Attacks in Smartphone Platforms.

, , , и . ICETE (Selected Papers), том 314 из Communications in Computer and Information Science, стр. 217-232. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a formal system-to-system authentication protocol., и . Comput. Commun., 19 (12): 954-961 (1996)Editorial., и . Comput. Secur., 29 (5): 521-522 (2010)Editorial., и . Comput. Secur., 29 (2): 165-166 (2010)Editorial., , , , , , и . Comput. Secur., (2014)Editorial., и . Comput. Secur., 28 (6): 325-326 (2009)Editorial., и . Comput. Secur., 30 (2-3): 89-90 (2011)ADoCSI: towards a transparent mechanism for disseminating Certificate Status Information., , и . Comput. Commun., 26 (16): 1851-1862 (2003)Functional Requirements for a Secure Electronic Voting System., , , , и . SEC, том 214 из IFIP Conference Proceedings, стр. 507-520. Kluwer, (2002)An Ontology-Driven antiSPIT Architecture., и . e-Democracy, том 26 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 189-198. Springer, (2009)In Cloud We Trust: Risk-Assessment-as-a-Service., , и . IFIPTM, том 401 из IFIP Advances in Information and Communication Technology, стр. 100-110. Springer, (2013)