Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving Computations Using Implicit Security., and . ICCCN, page 1-6. IEEE, (2013)Leave It to Weaver., , , and . SSPREW@ACSAC, page 6:1-6:9. ACM, (2018)A machine-learning based framework for detection of fake political speech., , , and . BigDataSE, page 80-87. IEEE, (2020)Towards a New Quasigroup Block Cipher for a Single-Chip FPGA Implementation., and . ICCCN, page 1-6. IEEE, (2015)Hardware Implementation of Quasigroup Encryption for SCADA Networks., , and . NCA, page 301-305. IEEE Computer Society, (2014)A Digital Forensics Investigation of a Smart Scale IoT Ecosystem., , , , and . TrustCom, page 710-717. IEEE, (2021)Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack., , , and . HICSS, page 1-10. ScholarSpace, (2020)Comparing the effectiveness of commercial obfuscators against MATE attacks., , , , and . SSPREW@ACSAC, page 8:1-8:11. ACM, (2016)Authentication Bypass and Remote Escalated I/O Command Attacks., , and . CISR, page 2:1-2:7. ACM, (2015)Instrumentation of Open-Source Software for Intrusion Detection., and . RV, volume 4839 of Lecture Notes in Computer Science, page 151-163. Springer, (2007)