Author of the publication

Achieving Optional Android Permissions without Operating System Modifications.

, and . VTC Spring, page 1-5. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel methodology for robust VBR video transmission in an ATM system., , and . Int. J. Netw. Manag., 12 (6): 347-355 (2002)Intelligent Internet of Things (IoT) Node Demonstrator for Device Monitoring and Control in the Oil and Gas Sector., and . CoRR, (2019)Characteristics of WAP Traffic., and . Wirel. Networks, 10 (1): 71-81 (2004)Bandwidth Efficient Secure Authentication and Encryption Techniques on IEC-60870-5-104 for Remote Outstations., , , , , and . SmartNets, page 1-6. IEEE, (2021)IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't., and . IEEE Consumer Electron. Mag., 5 (2): 79-86 (2016)Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy., , and . Sensors, 21 (1): 28 (2021)Organisational Contexts of Energy Cybersecurity., , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 384-402. Springer, (2021)Nodobo: Mobile Phone as a Software Sensor for Social Network Research., , and . VTC Spring, page 1-5. IEEE, (2011)On Demand Self-Organized Public Key Management for Mobile Ad Hoc Networks., and . VTC Spring, IEEE, (2009)Satellite-based study of water quality of Chilko lake (British Columbia, Canada): Impact on Sockeye salmon., , , , , , and . IGARSS, page 3858-3861. IEEE, (2014)