Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking smart card systems: Theory and practice., , , , and . Inf. Secur. Tech. Rep., 14 (2): 46-56 (2009)An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks., , , , , and . CoRR, (2016)An Introduction to Smart Cards.. Smart Cards, Tokens, Security and Applications, 2nd Ed., Springer, (2017)Smart Cards and Security for Mobile Communications., and . Smart Cards, Tokens, Security and Applications, 2nd Ed., Springer, (2017)Verifying Software Integrity in Embedded Systems: A Side Channel Approach., , , and . COSADE, volume 8622 of Lecture Notes in Computer Science, page 261-280. Springer, (2014)Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence., , and . CARDIS, volume 5189 of Lecture Notes in Computer Science, page 118-132. Springer, (2008)Firewall Mechanism in a User Centric Smart Card Ownership Model., , and . CARDIS, volume 6035 of Lecture Notes in Computer Science, page 118-132. Springer, (2010)Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor.. SmartIoT, page 1-8. IEEE, (2020)Location Based Application Availability., , and . OTM Workshops, volume 5872 of Lecture Notes in Computer Science, page 128-138. Springer, (2009)Problems and Prospects of Multi Application Smart cards in the UK Financial Industry., and . ICEBE, page 447-452. IEEE Computer Society, (2007)