Author of the publication

Security Analysis of Vendor Customized Code in Firmware of Embedded Device.

, , , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 722-739. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment., , and . Wireless Personal Communications, 85 (3): 1399-1409 (2015)A measurement study of a campus Wi-Fi network with mixed handheld and non-handheld traffic., , , , , , and . CCECE, page 848-853. IEEE, (2015)Optimal Control of Mixed-state Quantum Systems based on Lyapunov Method., , and . BIOSIGNALS, page 22-30. SciTePress, (2011)Estimate PM2.5 concentration in 500m resolution from satellite data and ground observation., , , , , and . IGARSS, page 5716-5719. IEEE, (2016)A Secure Data Deduplication Scheme Based on Differential Privacy., , , , and . ICPADS, page 1241-1246. IEEE, (2016)Multishot person reidentification using joint group sparse representation., , , and . J. Electronic Imaging, 27 (06): 063012 (2018)Predicting pilot behavior during midair encounters using recognition primed decision model., , and . Inf. Sci., (2018)An Empirical Study of Cohesion and Coupling: Balancing Optimization and Disruption., , , and . IEEE Trans. Evolutionary Computation, 22 (3): 394-414 (2018)Distance Measurement Model Based on RSSI in WSN., , , , and . Wireless Sensor Network, 2 (8): 606-611 (2010)NDDVD: an integrated and manually curated Neurodegenerative Diseases Variation Database., , , , , , , and . Database, (2018)