Author of the publication

Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware.

, , , , and . Towards Hardware-Intrinsic Security, Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AR-ARMA HMM and its application to speech enhancement., , , and . SIP, page 207-212. IASTED/ACTA Press, (2001)Skyline queries on keyword-matched data., , , and . Inf. Sci., (2013)A sequential algorithm for robust parameter estimation and enhancement of noisy speech., , , and . ISCAS, page 243-246. IEEE, (1993)Development of a simulation result management and prediction system using machine learning techniques., , and . IJDMB, 19 (1): 75-96 (2017)Direction-based clustering for efficient multicasting in wireless ad-hoc networks., , , and . MobiDE, page 55-62. ACM, (2008)Tag-based object similarity computation using term space dimension reduction., , and . SIGIR, page 790-791. ACM, (2009)PCA Fuzzy Mixture Model for Speaker Identification., , and . IDEAL, volume 2690 of Lecture Notes in Computer Science, page 992-999. Springer, (2003)Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations., , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 102-114. Springer, (2007)Wide-Weak Privacy-Preserving RFID Authentication Protocols., , , and . MOBILIGHT, volume 45 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 254-267. Springer, (2010)Designing of an Effective Monitor Partitioning System with Adjustable Virtual Bezel., , , , and . HCI (16), volume 6776 of Lecture Notes in Computer Science, page 537-546. Springer, (2011)