Author of the publication

FSquaDRA: Fast Detection of Repackaged Applications.

, , , , and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 130-145. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access Control via Lightweight Ontologies., , and . ICSC, page 352-355. IEEE Computer Society, (2011)Floodgate: A Micropayment Incentivized P2P Content Delivery Network., , , and . ICCCN, page 291-297. IEEE, (2008)Individual Single Source Authentication on the MBone., , and . IEEE International Conference on Multimedia and Expo (I), page 541-544. IEEE Computer Society, (2000)Issues in Multicast Security., , and . Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, page 119-139. Springer, (1999)Censorship-Resilient Communications through Information Scattering., , and . Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 82-89. Springer, (2010)A Certification Scheme for Electronic Commerce., and . Security Protocols Workshop, volume 1189 of Lecture Notes in Computer Science, page 19-32. Springer, (1996)Strong Authentication and Privacy with Standard Browsers., , and . Journal of Computer Security, 5 (3): 191-212 (1997)Proactive Password Checking with Decision Trees., , and . ACM Conference on Computer and Communications Security, page 67-77. ACM, (1997)XACML Policy Integration Algorithms., , , and . ACM Trans. Inf. Syst. Secur., 11 (1): 4:1-4:29 (2008)XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!, , and . SACMAT, page 219-227. ACM, (2006)