Search for persons
X
?
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering ,
2
White-box cryptography : practical protection on hostile..:
, In:
?
The AI Revolution: Driving Business Innovation and Research; Studies in Systems, Decision and Control ,
5
Multiple Credit Card Use Among Private Employees in Jakarta..:
, In:
?
Technology: Toward Business Sustainability; Lecture Notes in Networks and Systems ,
6