Author of the publication

Lightweight RFID Mutual Authentication Protocol against Feasible Problems.

, , , , and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 69-77. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PUF-Based RFID Authentication Protocol against Secret Key Leakage., , , and . APWeb, volume 7235 of Lecture Notes in Computer Science, page 318-329. Springer, (2012)Lightweight RFID Mutual Authentication Protocol against Feasible Problems., , , , and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 69-77. Springer, (2011)An Improved Scheme for Delegation Based on Usage Control., , , , and . FGCN (1), page 74-78. IEEE Computer Society, (2008)Hash-Based Tag Ownership Transfer Protocol against Traceability., , and . ICEBE, page 487-492. IEEE Computer Society, (2009)A Variant of Boyen-Waters Anonymous IBE Scheme., , , , , and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 42-56. Springer, (2011)