Author of the publication

Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems.

, , and . ATIS, volume 719 of Communications in Computer and Information Science, page 3-13. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing QR codes to verify the visual fidelity of image datasets for machine learning., , , , , , and . J. Netw. Comput. Appl., (2021)Exploiting QR Code Error Correction for Digital Image Watermarking., , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (2): 114-140 (2021)A Comprehensive Overview of IoT-Based Federated Learning: Focusing on Client Selection Methods., , , and . Sensors, 23 (16): 7235 (August 2023)Privacy-preserving file sharing on cloud storage with certificateless signcryption., , and . Theor. Comput. Sci., (2022)Sarcasm Relation to Time: Sarcasm Detection with Temporal Features and Deep Learning., , , , and . PRICAI (2), volume 14326 of Lecture Notes in Computer Science, page 287-297. Springer, (2023)Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family., and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 170-181. Springer, (2012)Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing., , , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 409-425. Springer, (2016)A QR Code Watermarking Approach Based on the DWT-DCT Technique., , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 314-331. Springer, (2017)On the security of text-based 3D CAPTCHAs., , and . Comput. Secur., (2014)Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns., , , , and . J. Imaging, 8 (12): 324 (December 2022)