Personensuche
X
?
E-Business and Telecommunications; Communications in Computer and Information Science ,
2
Explaining the Use of Cryptographic API in Android Malware:
, In:
?
Computer Security – ESORICS 2020; Lecture Notes in Computer Science ,
3
Biased RSA Private Keys: Origin Attribution of GCD-Factorab..:
, In:
?
Information Security Theory and Practice; Lecture Notes in Computer Science ,
4
Bringing Kleptography to Real-World TLS:
, In:
?
2022 26th International Conference on Circuits, Systems, Communications and Computers (CSCC) ,
12