Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction Tools., , , and . ISDFS, page 1-7. IEEE, (2020)A new file transfer protocol., , and . AT&T Tech. J., 64 (10): 2387-2411 (1985)A Calculus for Protocol Specification and Validation., , and . Protocol Specification, Testing, and Verification, page 19-34. North-Holland, (1983)On the Scheduling of Hyperperiodic Tasks., and . RTS, page 112-117. IEEE, (1993)Authority assignment in distributed multi-player proxy-based games., , , and . NETGAMES, page 5. ACM, (2006)An interference-robust receiver for ultra-wideband radio in SiGe BiCMOS technology., , , , , , , , , and . IEEE J. Solid State Circuits, 40 (12): 2563-2572 (2005)Adding Liveness Properties to Coupled Finite-State Machines., , and . ACM Trans. Program. Lang. Syst., 12 (2): 303-339 (1990)Next Gen PCFG Password Cracking., , and . IEEE Trans. Inf. Forensics Secur., 10 (8): 1776-1791 (2015)Evidence Handling in Proactive Cyberstalking Investigations: The PAPA Approach., , , and . SADFE, page 165-176. IEEE Computer Society, (2005)Supporting and Motivating Re-integration of Justice-Involved Individuals Through Dynamic Gamification., , , , , , , and . HCI (4), volume 14014 of Lecture Notes in Computer Science, page 258-275. Springer, (2023)