Author of the publication

Algebraic Replay Attacks on Authentication in RFID Protocols.

, , and . SecNet, volume 381 of Communications in Computer and Information Science, page 153-163. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path finding and Collision Avoidance in Crowd Simulation., , , and . J. Comput. Inf. Technol., 17 (3): 217-228 (2009)Self-organization in aggregating robot swarms: A DW-KNN topological approach., , , and . Biosyst., (2018)Motions Planning for Virtual Character., and . Computación y Sistemas, (2020)Cooperative co-evolution of configuration and control for modular robots., , , and . ICMCS, page 26-31. IEEE, (2014)Automatic Generation of SPL Structurally Valid Products Using Graph Transformations Approach., , , and . Modeling Approaches and Algorithms for Advanced Computer Applications, volume 488 of Studies in Computational Intelligence, Springer, (2013)A simulation model of pedestrian wayfinding behaviour in familiar environments., , and . Int. J. Comput. Appl. Technol., 61 (3): 183-197 (2019)A Virtual Viscoelastic Based Aggregation Model for Self-organization of Swarm Robots System., and . TAROS, volume 9716 of Lecture Notes in Computer Science, page 202-213. Springer, (2016)RFID Authentication Protocols Based on Error-Correcting Codes: A Survey., , , and . Wireless Personal Communications, 96 (1): 509-527 (2017)Crowd simulation influenced by agent's socio-psychological state, and . CoRR, (2010)Monitoring a robot swarm using a data-driven fault detection approach., , , and . Robotics Auton. Syst., (2017)