Author of the publication

Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms.

, , and . CyberSA, page 1-6. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Virtual Private Social Networks: Implementing user content confidentiality., , and . ICITST, page 306-312. IEEE, (2013)Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms., , and . CyberSA, page 1-6. IEEE, (2015)Hide-as-you-Type: An Approach to Natural Language Steganography through Sentence Modification., , and . HPCC/CSS/ICESS, page 945-952. IEEE, (2014)Ensuring Message Freshness in A Multi-Channel SMS Steganographic Banking Protocol., , , and . Cyber Security, page 1-7. IEEE, (2018)Dual carrier steganographic messaging protocols for mobile messaging applications.. Kingston University, Kingston upon Thames, London, UK, (2016)British Library, EThOS.A multi-channel steganographic protocol for secure SMS mobile banking., , , and . ICITST, page 248-253. IEEE, (2017)Increasing evaluation sensitivity to diversity., , and . Inf. Retr., 16 (4): 530-555 (2013)Passage retrieval vs. document retrieval for factoid question answering., and . SIGIR, page 427-428. ACM, (2003)The Positive and Negative Influence of Search Results on People's Decisions about the Efficacy of Medical Treatments., , , and . ICTIR, page 209-216. ACM, (2017)The influence of caption features on clickthrough patterns in web search., , , and . SIGIR, page 135-142. ACM, (2007)