Author of the publication

Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device.

, , , , and . Wirel. Commun. Mob. Comput., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provable secure authentication key agreement for wireless body area networks., , , and . Frontiers Comput. Sci., 18 (5): 185811 (October 2024)Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments., , and . Secur. Commun. Networks, (2021)ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment., , and . J. Medical Syst., 41 (3): 44:1-44:14 (2017)Generalized attack on ECDSA: known bits in arbitrary positions., , , and . Des. Codes Cryptogr., 91 (11): 3803-3823 (November 2023)IP Geolocation based on identification routers and local delay distribution similarity., , , , , and . Concurr. Comput. Pract. Exp., (2019)Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round., and . Int. J. Netw. Secur., 17 (6): 678-682 (2015)Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings.. Int. J. Netw. Secur., 16 (6): 494-497 (2014)Improved Herrmann-May's Attack with Merging Variables and Lower LLL Bound., , , and . Inscrypt (2), volume 14527 of Lecture Notes in Computer Science, page 209-229. Springer, (2023)Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks.. IACR Cryptology ePrint Archive, (2013)Analysis and improvement of an authenticated multiple key exchange protocol., and . Comput. Electr. Eng., 37 (2): 187-190 (2011)