Author of the publication

SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks.

, , , and . IMIS, page 520-526. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Security Model for WBEM., , , and . OTM Workshops, volume 2889 of Lecture Notes in Computer Science, page 975-988. Springer, (2003)Effects of H.265 encoding on PNU and source camera identification., and . RACS, page 279-284. ACM, (2018)FASTdoop: a versatile and efficient library for the input of FASTA and FASTQ files for MapReduce Hadoop bioinformatics applications., , , and . Bioinform., 33 (10): 1575-1577 (2017)Ensuring non-repudiation in human conversations over VoIP communications., , , and . Int. J. Commun. Networks Distributed Syst., 16 (4): 315-334 (2016)TRUST: TRust Unguarded Service Terminals., , , , , and . I-SPAN, volume 1080 of Communications in Computer and Information Science, page 155-169. Springer, (2019)A Novel Anti-forensics Technique for the Android OS., , , and . BWCCA, page 380-385. IEEE Computer Society, (2011)An Efficient Implementation of the Algorithm by Lukáš et al. on Hadoop., , , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 475-489. (2017)Symmetric Adaptive Customer Modeling for Electronic Commerce in a Distributed Environment., , , , and . Trends in Distributed Systems for Electronic Commerce, volume 1402 of Lecture Notes in Computer Science, page 11-25. Springer, (1998)A Forensic Analysis of Images on Online Social Networks., , and . INCoS, page 679-684. IEEE Computer Society, (2011)On the Construction of a False Digital Alibi on the Android OS., , , , and . INCoS, page 685-690. IEEE Computer Society, (2011)