Author of the publication

A New Approach to Executable File Fragment Detection in Network Forensics.

, , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 510-517. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease., , , and . Theor. Comput. Sci., (2019)Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key., , , , and . IACR Cryptol. ePrint Arch., (2018)UIT-DANGNT-CLNLP at SemEval-2017 Task 9: Building Scientific Concept Fixing Patterns for Improving CAMR., and . SemEval@ACL, page 909-913. Association for Computational Linguistics, (2017)MC-OCR Challenge 2021: An end-to-end recognition framework for Vietnamese Receipts., , , , , , , , and . RIVF, page 1-6. IEEE, (2021)Covert Authentication from Lattices., and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 480-500. Springer, (2022)Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings., , , , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 659-690. Springer, (2021)Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key., , , , and . EuroS&P, page 215-230. IEEE, (2019)Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 427-449. Springer, (2015)Adaptive Oblivious Transfer with Access Control from Lattice Assumptions., , , , and . ASIACRYPT (1), volume 10624 of Lecture Notes in Computer Science, page 533-563. Springer, (2017)Lattice-Based Zero-Knowledge Arguments for Integer Relations., , , and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 700-732. Springer, (2018)