Author of the publication

Hamming distributions of popular perceptual hashing techniques.

, and . Forensic Sci. Int. Digit. Investig., 44 (Supplement): 301509 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier., , , and . IEEE BigData, page 5034-5039. IEEE, (2018)An Omnidirectional Approach to Touch-based Continuous Authentication., , , and . CoRR, (2023)CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption., , , , , and . VTC Fall, page 1-6. IEEE, (2023)GLASS: Towards Secure and Decentralized eGovernance Services Using IPFS., , , , , , , , , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 40-57. Springer, (2021)Launching Adversarial Label Contamination Attacks Against Malicious URL Detection., , , and . TrustBus, volume 12927 of Lecture Notes in Computer Science, page 69-82. Springer, (2021)Enhancing Network Management using Mobile Agents., , and . ECBS, page 218-. IEEE Computer Society, (2000)Requirements for 5G based telemetric cardiac monitoring., , , , and . WiMob, page 1-4. IEEE, (2018)TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies., , , and . COMPSAC, page 1235-1240. IEEE, (2020)Scalable Multi-domain Trust Infrastructures for Segmented Networks., , , , , and . CAMAD, page 182-187. IEEE, (2023)Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations., , , and . CAMAD, page 194-199. IEEE, (2023)