From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective., , , и . ICSSA, стр. 46-51. IEEE, (2019)InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs., , , , и . ARES, стр. 625-633. IEEE Computer Society, (2012)The Role and Security of Firewalls in IaaS Cloud Computing., , , и . ARES, стр. 70-79. IEEE Computer Society, (2015)Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications., , , , , , и . NDSS, The Internet Society, (2012)QR Code Security: A Survey of Attacks and Challenges for Usable Security., , , , , и . HCI (24), том 8533 из Lecture Notes in Computer Science, стр. 79-90. Springer, (2014)A tamper-proof audit and control system for the doctor in the loop., , , , и . Brain Informatics, 3 (4): 269-279 (2016)Using Internal MySQL/InnoDB B-Tree Index Navigation for Data Hiding., , и . IFIP Int. Conf. Digital Forensics, том 462 из IFIP Advances in Information and Communication Technology, стр. 179-194. Springer, (2015)Security tests for mobile applications - Why using TLS/SSL is not enough., , , и . ICST Workshops, стр. 1-2. IEEE Computer Society, (2015)QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes., , , , , и . ARES, стр. 230-237. IEEE Computer Society, (2015)Witnesses for the Doctor in the Loop., , , , и . BIH, том 9250 из Lecture Notes in Computer Science, стр. 369-378. Springer, (2015)