Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism., , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 161-172. Springer, (2010)Can You Call the Software in Your Device be Firmware?, , and . ICEBE, page 188-195. IEEE Computer Society, (2016)Let's Get Mobile: Secure FOTA for Automotive System., , , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 503-510. Springer, (2015)An Exploratory Analysis of the Security Risks of the Internet of Things in Finance., , , and . TrustBus, volume 10442 of Lecture Notes in Computer Science, page 164-179. Springer, (2017)A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags., , , , and . TrustCom/BigDataSE/ISPA (1), page 612-620. IEEE, (2015)Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture., , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 214-227. Springer, (2012)Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager., , and . TrustCom, page 448-456. IEEE Computer Society, (2014)Application-Binding Protocol in the User Centric Smart Card Ownership Model., , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 208-225. Springer, (2011)An Introduction to Java Card Programming., , and . Secure Smart Embedded Devices, Platforms and Applications, Springer, (2014)Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments., , and . ARES, page 7:1-7:10. ACM, (2017)