Author of the publication

Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical Memory.

, , , , and . SECRYPT, page 43-54. SciTePress, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single-step creation of localized Delaunay triangulations., and . Wireless Networks, 15 (7): 845-858 (2009)Building Adaptive Systems with Service Composition Frameworks., , and . OTM Conferences (1), volume 4803 of Lecture Notes in Computer Science, page 754-771. Springer, (2007)Towards Incentive-Compatible Pricing for Bandwidth Reservation in Community Network Clouds., , , and . GECON, volume 9512 of Lecture Notes in Computer Science, page 251-264. Springer, (2015)Asynchronous Lease-Based Replication of Software Transactional Memory., , and . Middleware, volume 6452 of Lecture Notes in Computer Science, page 376-396. Springer, (2010)On the Effectiveness of Punishments in a Repeated Epidemic Dissemination Game., and . SSS, volume 8255 of Lecture Notes in Computer Science, page 206-220. Springer, (2013)N-party BAR Transfer., , , and . OPODIS, volume 7109 of Lecture Notes in Computer Science, page 392-408. Springer, (2011)Byzantine renaming in synchronous systems with t<N., and . PODC, page 210-219. ACM, (2013)Modelling adaptive services for distributed systems., , and . SAC, page 2174-2180. ACM, (2008)@Flood: Auto-Tunable Flooding for Wireless Ad Hoc Networks., , and . Euro-Par (2), volume 6272 of Lecture Notes in Computer Science, page 478-489. Springer, (2010)On the Range of Equilibria Utilities of a Repeated Epidemic Dissemination Game with a Mediator., and . ICDCN, page 19:1-19:10. ACM, (2015)