Author of the publication

Technical recommendations for improving security of email communications.

, , and . MIPRO, page 1381-1386. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments., and . JISIC, page 115-122. IEEE, (2014)Untangling RFID Privacy Models., and . J. Comput. Networks Commun., (2013)Technical recommendations for improving security of email communications., , and . MIPRO, page 1381-1386. IEEE, (2016)Physical attacks against the lack of perfect forward secrecy in DECT encrypted communications and possible countermeasures., , and . IWCMC, page 594-599. IEEE, (2015)Improved Forensic Recovery of PKZIP Stream Cipher Passwords., , and . ICISSP, page 328-335. SciTePress, (2019)A probabilistic framework for improved password strength metrics., , and . ICCST, page 1-6. IEEE, (2014)Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries., , and . Forensic Sci. Int. Digit. Investig., 44 (Supplement): 301507 (March 2023)A survey exploring open source Intelligence for smarter password cracking., , and . Digit. Investig., (2020)How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts., , , and . Digit. Investig., (2021)Privacy-Preserving RFID Systems: Model and Constructions., , , and . IACR Cryptology ePrint Archive, (2010)