Author of the publication

Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics.

, , , , , and . J. Inf. Secur. Appl., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics., , , , , and . J. Inf. Secur. Appl., (2022)Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers., , , , , , and . J. Cryptol., 19 (4): 441-462 (2006)DES with any reduced masked rounds is not secure against side-channel attacks., , and . Comput. Math. Appl., 60 (2): 347-354 (2010)One-Shot Video Inpainting., , and . CoRR, (2023)Semi-bent Functions., , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 107-118. Springer, (1994)On the Correlation Immune Functions and Their Nonlinearity., , , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 232-243. Springer, (1996)New Public-Key Cryptosystem Using Braid Groups., , , , , and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 166-183. Springer, (2000)X-SSD: A Storage System with Native Support for Database Logging and Replication., , , , , , , and . SIGMOD Conference, page 988-1002. ACM, (2022)Amplified Boomerang Attack against Reduced-Round SHACAL., , , , , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 243-253. Springer, (2002)It Takes Two: Instrumenting the Interaction between In-Memory Databases and Solid-State Drives., , , , , and . CIDR, www.cidrdb.org, (2020)