Author of the publication

Decrypting password-based encrypted backup data for Huawei smartphones.

, , , , and . Digit. Investig., 28 (Supplement): 119-125 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" Digital Investigation 28 (2019) 200890., , , , and . Digit. Investig., (2021)Decrypting password-based encrypted backup data for Huawei smartphones., , , , and . Digit. Investig., 28 (Supplement): 119-125 (2019)A study on LG content lock and data acquisition from apps based on content lock function., , and . Digit. Investig., (2021)How to decrypt PIN-Based encrypted backup data of Samsung smartphones., , and . Digit. Investig., (2018)Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data., , , , , and . Digit. Investig., (2021)Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes., , , , and . Peer-to-Peer Netw. Appl., 13 (2): 489-513 (2020)Data acquisition methods using backup data decryption of Sony smartphones., , , , , and . Digital Investigation, (2019)A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC., , , , , and . Digit. Investig., (2020)Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS., , , and . Digit. Investig., (2021)New Efficient Padding Methods Secure Against Padding Oracle Attacks., , , , , , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 329-342. Springer, (2015)