Author of the publication

Evasive Malware via Identifier Implanting.

, , , , , , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 162-184. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract)., , and . EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 412-422. Springer, (1989)High-Speed Implementation Methods for RSA Scheme., , and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 221-238. Springer, (1992)Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations., , and . ISC, volume 2851 of Lecture Notes in Computer Science, page 408-421. Springer, (2003)Coding Theory and its Applications in Japan., and . AAECC, volume 356 of Lecture Notes in Computer Science, page 301-305. Springer, (1987)Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions., , , , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 1039-1048. Springer, (2005)A Multi-Purpose Proof System - for Identity and Membership Proofs., , and . ASIACRYPT, volume 739 of Lecture Notes in Computer Science, page 397-411. Springer, (1991)Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine., , , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 128-141. Springer, (2007)Designing and Implementation of Mobile Terminal for Telehealth Care Life Support System., , and . CSCWD, page 479-485. IEEE, (2002)Prototyping security test objects for use with advanced biometric authentication systems.. AsiaCCS, page 2. ACM, (2008)Signature for Objects: Formalizing How to Authenticate Physical Data and More., , , , , , , , , and 3 other author(s). FC (1), volume 13950 of Lecture Notes in Computer Science, page 182-199. Springer, (2023)