Author of the publication

A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC.

, , , , , and . Digit. Investig., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" Digital Investigation 28 (2019) 200890., , , , and . Digit. Investig., (2021)Decrypting password-based encrypted backup data for Huawei smartphones., , , , and . Digit. Investig., 28 (Supplement): 119-125 (2019)A study on LG content lock and data acquisition from apps based on content lock function., , and . Digit. Investig., (2021)Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes., , , , and . Peer-to-Peer Netw. Appl., 13 (2): 489-513 (2020)Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data., , , , , and . Digit. Investig., (2021)How to decrypt PIN-Based encrypted backup data of Samsung smartphones., , and . Digit. Investig., (2018)Data acquisition methods using backup data decryption of Sony smartphones., , , , , and . Digital Investigation, (2019)Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS., , , and . Digit. Investig., (2021)A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC., , , , , and . Digit. Investig., (2020)New Efficient Padding Methods Secure Against Padding Oracle Attacks., , , , , , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 329-342. Springer, (2015)