Author of the publication

A Verified Secure Protocol Model of OAuth Dynamic Client Registration.

, , , , , and . BigCom, page 106-110. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Divide and Conquer: Recovering Contextual Information of Behaviors in Android Apps around Limited-quantity Audit Logs., , , , , and . CoRR, (2018)Detecting Stubborn Permission Requests in Android Applications., , , and . BigCom, page 84-89. IEEE Computer Society, (2018)Automatically Detecting Malicious Sensitive Data Usage in Android Applications., , , , and . BigCom, page 102-107. IEEE Computer Society, (2018)Static Analysis of Superfluous Network Transmissions in Android Applications., , , , and . Int. J. Netw. Secur., 22 (3): 409-418 (2020)SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications., , , , and . IEEE Syst. J., 14 (1): 375-386 (2020)A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems., , , , , and . Int. J. Netw. Secur., 19 (5): 794-803 (2017)Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications., , , and . Int. J. Netw. Secur., 22 (3): 381-391 (2020)AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Identifying Superfluous Network Transmissions in Android Applications., , , , and . BigCom, page 96-101. IEEE Computer Society, (2018)Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus., , , , and . Trustcom/BigDataSE/ISPA, page 42-49. IEEE, (2016)