Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis., , and . Journal in Computer Virology, 6 (3): 207-237 (2010)Honeypot Forensics, Part II: Analyzing the Compromised Host., , , and . IEEE Security & Privacy, 2 (5): 77-80 (2004)Small treatise about e-manipulation for honest people., and . Journal in Computer Virology, 6 (2): 143-159 (2010)Wet-process deposition of TSV liner and metal films., , and . 3DIC, page 1-6. IEEE, (2009)Individual GP: an Alternative Viewpoint for the Resolution of Complex Problems., , , and . GECCO, page 974-981. Morgan Kaufmann, (1999)Links between cryptography and information hiding., and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 269-280. SPIE, (2002)Rootkit modeling and experiments under Linux., , and . Journal in Computer Virology, 4 (2): 137-157 (2008)New Threats and Attacks on the World Wide Web., , and . IEEE Security & Privacy, 4 (2): 72-75 (2006)Polar IFS + Parisian Genetic Programming = Efficient IFS Inverse Problem Solving., , , and . Genetic Programming and Evolvable Machines, 1 (4): 339-361 (2000)StirMark Benchmark: Audio Watermarking Attacks., , , , , , , and . ITCC, page 49-54. IEEE Computer Society, (2001)