Author of the publication

Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.

, , , , , , , and . IFIP Int. Conf. Digital Forensics, volume 383 of IFIP Advances in Information and Communication Technology, page 129-142. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signcryption in Hierarchical Identity Based Cryptosystem., , , and . IACR Cryptology ePrint Archive, (2004)A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities., , , , and . Pervasive Mob. Comput., (2017)PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid., , , , and . IEEE Trans. Dependable Secur. Comput., 12 (1): 85-97 (2015)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , and . Quantum Inf. Process., 13 (6): 1425-1435 (2014)Randomized Competitive Algorithms for Successful and Unsuccessful Search., and . Comput. J., 39 (5): 427-439 (1996)Unsuccessful Search in Self-Adjusting Data Structures., and . J. Algorithms, 15 (3): 447-481 (1993)WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps., , , , , and . WISEC, page 25:1-25:12. ACM, (2015)Authenticated Directed Diffusion., , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 366-377. Springer, (2008)Integrating Different Signature Purposes in Workflow Systems - A Case Study., , and . ICSC, volume 1749 of Lecture Notes in Computer Science, page 360-366. Springer, (1999)Dynamic Software Birthmark for Java Based on Heap Memory Analysis., , and . Communications and Multimedia Security, volume 7025 of Lecture Notes in Computer Science, page 94-107. Springer, (2011)