Author of the publication

Covert Channel Detection in the ICMP Payload Using Support Vector Machine.

, , , , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 828-835. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delaunay Triangles Model for Image-Based Motion Retargeting., and . DEFORM/AVATARS, volume 196 of IFIP Conference Proceedings, page 158-168. Kluwer, (2000)GA based Adaptive Sampling for Image-based Walkthrough., , and . EGVE, page 135-142. Eurographics Association, (2006)A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method., , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 93-99. Springer, (2012)Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006., , and . IACR Cryptology ePrint Archive, (2007)One-Round Protocols for Two-Party Authenticated Key Exchange., , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 220-232. Springer, (2004)One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange., , and . Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, page 87-96. Springer, (2006)Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency., , and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 171-188. Springer, (2013)Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing., , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 482-496. Springer, (2002)A Practical Inter-sensor Broadcast Authentication Scheme., , , and . HCI (5), volume 4554 of Lecture Notes in Computer Science, page 399-405. Springer, (2007)Anonymity Control in Multi-bank E-Cash System., and . INDOCRYPT, volume 1977 of Lecture Notes in Computer Science, page 104-116. Springer, (2000)