Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are chrome extensions compliant with the spirit of least privilege?, , , and . Int. J. Inf. Sec., 21 (6): 1283-1297 (2022)DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication., , and . ICISSP, page 528-535. SCITEPRESS, (2022)Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks., , , and . Sensors, 14 (12): 22619-22642 (2014)No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns., , and . ACSAC, page 896-910. ACM, (2022)After You, Please: Browser Extensions Order Attacks and Countermeasures., , and . CoRR, (2019)After you, please: browser extensions order attacks and countermeasures., , and . Int. J. Inf. Sec., 19 (6): 623-638 (2020)Are the Interpulse Intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation., , and . Future Gener. Comput. Syst., (2020)Attribute-based encryption with enforceable obligations., , , and . J. Cryptogr. Eng., 13 (3): 343-371 (September 2023)A collaborative access control framework for online social networks., , , and . J. Log. Algebraic Methods Program., (2020)IBE.js: A Framework for Instrumenting Browser Extensions., and . ICSOFT, page 141-150. SCITEPRESS, (2023)