Author of the publication

The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask).

, , , , , , and . ACSAC, page 141-150. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction Tools., , , and . ISDFS, page 1-7. IEEE, (2020)An interference-robust receiver for ultra-wideband radio in SiGe BiCMOS technology., , , , , , , , , and . IEEE J. Solid State Circuits, 40 (12): 2563-2572 (2005)Authority assignment in distributed multi-player proxy-based games., , , and . NETGAMES, page 5. ACM, (2006)On the Scheduling of Hyperperiodic Tasks., and . RTS, page 112-117. IEEE, (1993)Next Gen PCFG Password Cracking., , and . IEEE Trans. Inf. Forensics Secur., 10 (8): 1776-1791 (2015)A new file transfer protocol., , and . AT&T Tech. J., 64 (10): 2387-2411 (1985)A Calculus for Protocol Specification and Validation., , and . Protocol Specification, Testing, and Verification, page 19-34. North-Holland, (1983)Adding Liveness Properties to Coupled Finite-State Machines., , and . ACM Trans. Program. Lang. Syst., 12 (2): 303-339 (1990)Supporting and Motivating Re-integration of Justice-Involved Individuals Through Dynamic Gamification., , , , , , , and . HCI (4), volume 14014 of Lecture Notes in Computer Science, page 258-275. Springer, (2023)Evidence Handling in Proactive Cyberstalking Investigations: The PAPA Approach., , , and . SADFE, page 165-176. IEEE Computer Society, (2005)