Author of the publication

Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream.

, , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 389-401. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains., , , , and . ICISS, volume 6503 of Lecture Notes in Computer Science, page 246-260. Springer, (2010)Authenticated CAN Communications Using Standardized Cryptographic Techniques., , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 330-343. (2016)On the Trust and Trust Modeling for the Future Fully-Connected Digital World: A Comprehensive Study., , , , and . IEEE Access, (2021)PreCrime to the rescue: defeating mobile malware one-step ahead., , , , , and . APSys, page 5:1-5:7. ACM, (2014)Adaptive Stream Authentication for Wireless Multimedia Communications., and . WCNC, page 2613-2618. IEEE, (2007)Secure and Practical Key Distribution for RFID-Enabled Supply Chains., , and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 356-372. Springer, (2011)Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols., and . SEC, volume 232 of IFIP, page 109-120. Springer, (2007)Resilient Aggregation Scheme for Confidential Sensor Reports., and . ICC, page 1472-1477. IEEE, (2007)Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks., , and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 200-209. Springer, (2005)RFID privacy: relation between two notions, minimal condition, and efficient construction., , , and . ACM Conference on Computer and Communications Security, page 54-65. ACM, (2009)