Author of the publication

Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts.

, , and . IMF, page 142-152. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Download Accelerator Plus (DAP) for Forensic Artefacts., , and . IMF, page 142-152. IEEE Computer Society, (2009)Attacks on Bluetooth Security Architecture and Its Countermeasures., , and . ISA, volume 76 of Communications in Computer and Information Science, page 190-197. Springer, (2010)Analysis of Free Download Manager for Forensic Artefacts., , and . ICDF2C, volume 31 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 59-68. Springer, (2009)Think Before Your LFSRs Jump., , and . CIT, page 1070-1074. IEEE Computer Society, (2010)Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 722-731. Springer, (2009)Secure architecture for RFID enabled supply chain hierarchy., and . PST, page 167-172. IEEE, (2010)Downlink resource scheduling technique for maximized throughput with improved fairness and reduced BLER in LTE., , and . TSP, page 163-167. IEEE, (2015)Authenticated Encryption in WSN Using eSTREAM Ciphers., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 741-749. Springer, (2009)