Author of the publication

Bind your phone number with caution: automated user profiling through address book matching on smartphone.

, , , , and . AsiaCCS, page 335-340. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault-tolerate Multiparty Electronic Contract Signing Protocol., and . AMT, volume 138 of Frontiers in Artificial Intelligence and Applications, page 79-85. IOS Press, (2006)Automated User Profiling in Location-Based Mobile Messaging Applications., , , , , and . TrustCom, page 18-26. IEEE Computer Society, (2014)Efficiently Attribute-Based Access Control for Mobile Cloud Storage System., , , and . TrustCom, page 292-299. IEEE Computer Society, (2014)Multiple Handshakes Security of TLS 1.3 Candidates., , , , and . IEEE Symposium on Security and Privacy, page 486-505. IEEE Computer Society, (2016)Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication., , and . IEEE Communications Letters, 9 (4): 372-374 (2005)Computing Walsh coefficients from the algebraic normal form of a Boolean function., , , and . Cryptography and Communications, 6 (4): 335-358 (2014)Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round., and . IET Information Security, 4 (3): 167-184 (2010)Generic Constructions for Strong Designated Verifier Signature., , and . JIPS, 7 (1): 159-172 (2011)A New Direct Anonymous Attestation Scheme from Bilinear Maps., and . ICYCS, page 2308-2313. IEEE Computer Society, (2008)Composing Administrative Scope of Delegation Policies based on extended XACML., and . EDOC, page 467-470. IEEE Computer Society, (2006)