Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

mallotROPism: a metamorphic engine for malicious software variation development., , and . Int. J. Inf. Sec., 21 (1): 61-78 (2022)Transforming malicious code to ROP gadgets for antivirus evasion., , , and . IET Inf. Secur., 13 (6): 570-578 (2019)A network-assisted mobile VPN for securing users data in UMTS., , and . Comput. Commun., 31 (14): 3315-3327 (2008)A web tool for analyzing FIDO2/WebAuthn Requests and Responses., , and . ARES, page 125:1-125:10. ACM, (2021)Solving the cold start problem in Trust Management in IoT., , , and . ARES, page 128:1-128:9. ACM, (2021)Trusted and Secure Self-Sovereign Identity framework., , , and . ARES, page 101:1-101:6. ACM, (2022)Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era., , , , , , and . ARES, page 95:1-95:8. ACM, (2023)A Digital Twin for the 5G Era: the SPIDER Cyber Range., , , , , , , , , and 2 other author(s). WoWMoM, page 567-572. IEEE, (2022)A Better Time Approximation Scheme for e-Passports., , and . TrustBus, volume 8058 of Lecture Notes in Computer Science, page 13-23. Springer, (2013)Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices., , , and . I3E, volume 399 of IFIP Advances in Information and Communication Technology, page 178-185. Springer, (2013)