Author of the publication

Web security in a windows system as PrivacyDefender in private browsing mode.

, , , and . Multimedia Tools Appl., 74 (5): 1667-1688 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multicasting Secret Images using a Knapsack-like Cipher System.. CAINE, page 67-72. ISCA, (2004)ID-based authentication for mobile conference call., , , and . SEC, volume 54 of IFIP Conference Proceedings, page 49-58. Chapman & Hall, (1996)Reversible SMVQ Image Hiding Using Adaptive Search Order Coding., , , , and . DICTA, page 1-6. IEEE, (2016)Dynamic embedding strategy of VQ-based information hiding approach., , , and . J. Vis. Commun. Image Represent., (2019)Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks., , and . J. Commun., 3 (1): 20-26 (2008)Secure Protocol for Identity-based Provable Data Possession in Cloud Storage., , , , and . ICCCS, page 327-331. IEEE, (2019)A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing., and . DEXA, volume 1677 of Lecture Notes in Computer Science, page 372-381. Springer, (1999)A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN., , , and . NCM, page 2062-2068. IEEE Computer Society, (2009)Tor Browser Forensics in Exploring Invisible Evidence., , , and . SMC, page 3909-3914. IEEE, (2018)Guest Editorial: Information and Communication Security in Multimedia Applications., and . Multimedia Tools Appl., 75 (22): 14503-14506 (2016)