|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Mobile malware prevention using temporal information
If you have a question about this talk, please contact Markus Kuhn.
Abstract not available
This talk is part of the Computer Laboratory Security Group meeting presentations series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsThe political economy of AIDS in Africa Beyond i.i.d. in Information Theory Work Shop Finance and Accounting Subject Group
Other talksAre there limits to evolution? (Conference 25 & 26 September 2014) Re-building the diseased retina with stem cells CGHR Research Group Tumour natural history, structure and nomenclature (lecture/demonstration) Who by sound and who by ground, who by pin and who by skin: side-channel key extraction from PCs System Identification for Quantum Linear Systems