Author of the publication

UFLE: a user-friendly location-free encryption system for mobile users.

, , , and . Secur. Commun. Networks, 7 (10): 1477-1487 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method to Evaluate CFG Comparison Algorithms., and . QSIC, page 95-104. IEEE, (2014)Protecting Digital Data Privacy in Computer Forensic Examination., , , , , , and . SADFE, page 1-6. IEEE Computer Society, (2011)Dynamic Software Birthmark for Java Based on Heap Memory Analysis., , and . Communications and Multimedia Security, volume 7025 of Lecture Notes in Computer Science, page 94-107. Springer, (2011)UFLE: a user-friendly location-free encryption system for mobile users., , , and . Secur. Commun. Networks, 7 (10): 1477-1487 (2014)Heap Graph Based Software Theft Detection., , and . IEEE Trans. Inf. Forensics Secur., 8 (1): 101-110 (2013)DroidChecker: analyzing android applications for capability leak., , and . WISEC, page 125-136. ACM, (2012)CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android., , , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 446-453. Springer, (2014)Identifying Volatile Data from Multiple Memory Dumps in Live Forensics., , , , , , , , , and . IFIP Int. Conf. Digital Forensics, volume 337 of IFIP Advances in Information and Communication Technology, page 185-194. Springer, (2010)JSBiRTH: Dynamic JavaScript Birthmark Based on the Run-Time Heap., , and . COMPSAC, page 407-412. IEEE Computer Society, (2011)