Author of the publication

Collecting Internet Malware Based on Client-side Honeypot.

, , , , and . ICYCS, page 1493-1498. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof of Forward Security for Password-based Authenticated Key Exchange., and . Int. J. Netw. Secur., 7 (3): 335-341 (2008)MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Security Arguments for a Class of ID-based Signatures., , and . IACR Cryptology ePrint Archive, (2007)An Improved Algorithm for uP + vQ Using JSF13., , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 467-478. Springer, (2004)An Efficient Key-Evolving Signature Scheme Based on Pairing., and . FTDCS, page 68-73. IEEE Computer Society, (2004)Collecting Internet Malware Based on Client-side Honeypot., , , , and . ICYCS, page 1493-1498. IEEE Computer Society, (2008)High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes., , , , and . WISE (2), volume 8787 of Lecture Notes in Computer Science, page 336-350. Springer, (2014)An Efficient ID-based Proxy Signature Scheme from Pairings., and . IACR Cryptology ePrint Archive, (2006)Universally Composable Three-Party Key Distribution., , , and . IACR Cryptology ePrint Archive, (2006)An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme ., and . CISC, volume 3822 of Lecture Notes in Computer Science, page 42-52. Springer, (2005)