Author of the publication

Practical off-line authentication.

, , , and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 141-148. SPIE, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Networking and Storage: The Next Computing Elements in Exascale Systems?, , , , and . IEEE Data Eng. Bull., 43 (1): 60-71 (2020)Chracer: Memory analysis of Chromium-based browsers., , , and . Forensic Sci. Int. Digit. Investig., 46 (Supplement): 301613 (October 2023)NTFS Data Tracker: Tracking file data history based on $LogFile., , and . Digit. Investig., (2021)A method and tool to recover data deleted from a MongoDB., and . Digit. Investig., (2018)A study of user data integrity during acquisition of Android devices., , , , , and . Digit. Investig., 10 (Supplement): S3-S11 (2013)Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics., , , , , and . J. Inf. Secur. Appl., (2022)Semi-bent Functions., , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 107-118. Springer, (1994)Pseudorandomness from Braid Groups., , and . CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 486-502. Springer, (2001)New Public-Key Cryptosystem Using Braid Groups., , , , , and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 166-183. Springer, (2000)Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups., and . EUROCRYPT, volume 2332 of Lecture Notes in Computer Science, page 14-28. Springer, (2002)