Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Searching the Web for Illegal Content: The Anatomy of a Semantic Search Engine., and . ICGS3, volume 534 of Communications in Computer and Information Science, page 113-122. Springer, (2015)Data reverse engineering on a smartphone., , , , and . ICUMT, page 1-8. IEEE, (2009)Security overview for m-payed virtual ticketing.. PIMRC, page 844-848. IEEE, (2003)A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions., , and . ICMB, page 28-34. IEEE Computer Society, (2005)A Case Study on Digital Forensics in the Cloud., , and . CyberC, page 111-116. IEEE Computer Society, (2012)Forensic disk image indexing and search in an HPC environment., , , , , , and . HPCS, page 558-565. IEEE, (2014)Triage-based automated analysis of evidence in court cases of copyright infringement., , , and . ICC, page 6668-6672. IEEE, (2012)Local Authentication with Bluetooth enabled Mobile Devices., , and . ICAS/ICNS, page 72. IEEE Computer Society, (2005)A Survey of PDA Forensic Investigation., and . International Conference on Wireless Networks, page 583-590. CSREA Press, (2003)A Secure Mobile Local Payment Application Framework.. Security and Management, page 85-92. CSREA Press, (2003)