Author of the publication

Position Manipulation Attacks to Balise-Based Train Automatic Stop Control.

, , , and . IEEE Trans. Vehicular Technology, 67 (6): 5287-5301 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Person-To-Person Communications Based on Biometrics Signals., , and . SEC, volume 181 of IFIP, page 205-222. Springer, (2005)Trust on Web Browser: Attack vs. Defense., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 241-253. Springer, (2003)Multi-stage Binary Code Obfuscation Using Improved Virtual Machine., , , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 168-181. Springer, (2011)Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme., , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 171-183. Springer, (2007)Compliant encryption of jpeg2000 codestreanis., and . ICIP, page 3439-3442. IEEE, (2004)Blocking Foxy Phishing Emails with Historical Information., , , and . ICC, page 1-5. IEEE, (2010)Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting.. ICASSP (2), page 13-16. IEEE, (2005)A Batch Authentication Protocol for V2G Communications., , , and . NTMS, page 1-5. IEEE, (2011)Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream., , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 389-401. Springer, (2005)An Attack on SMC-Based Software Protection., , and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 352-368. Springer, (2006)