Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

mallotROPism: a metamorphic engine for malicious software variation development., , and . Int. J. Inf. Sec., 21 (1): 61-78 (2022)Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13 (2): 96-127 (2022)Contract-Less Mobile Data Access Beyond 5G: Fully-Decentralized, High-Throughput and Anonymous Asset Trading Over the Blockchain., , , , and . IEEE Access, (2021)A survey of voice and communication protection solutions against wiretapping., , , and . Comput. Electr. Eng., (2019)Reducing False Synchronizations in 3G-WLAN Integrated Networks., , and . IEEE Trans. Wirel. Commun., 10 (11): 3765-3773 (2011)Transforming malicious code to ROP gadgets for antivirus evasion., , , and . IET Inf. Secur., 13 (6): 570-578 (2019)Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone., , and . Sensors, 21 (2): 520 (2021)A network-assisted mobile VPN for securing users data in UMTS., , and . Comput. Commun., 31 (14): 3315-3327 (2008)Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication., , , , , , , , , and 2 other author(s). IEEE Trans. Inf. Forensics Secur., (2020)SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform., , , , , , , , , and 1 other author(s). Sensors, 22 (17): 6527 (2022)