Author of the publication

Algebraic Replay Attacks on Authentication in RFID Protocols.

, , and . SecNet, volume 381 of Communications in Computer and Information Science, page 153-163. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weaknesses in Two RFID Authentication Protocols., , , and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 162-172. Springer, (2015)An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System, , and . CoRR, (2012)Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks., , and . Int. J. Commun. Networks Distributed Syst., 21 (1): 56-79 (2018)BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks., , , , and . CSR, page 148-153. IEEE, (2023)Android Malware Detection using Convolutional Deep Neural Networks., and . ICAASE, page 1-7. IEEE, (2020)A Scalable Proof Methodology for RISC Processor Designs: A Functional Approach., and . ITNG, page 241-246. IEEE Computer Society, (2008)On Designing a Systolic Network for the Resolution of Linear Systems Using the " Gauss-Seidel " Method., , and . AICCSA, page 283-286. IEEE Computer Society, (2001)Comparative analysis of hierarchical cluster protocols for wireless sensor networks., , and . Int. J. High Perform. Comput. Netw., 13 (4): 366-377 (2019)RFID Authentication Protocols Based on Error-Correcting Codes: A Survey., , , and . Wireless Personal Communications, 96 (1): 509-527 (2017)Pruned improved eight-point approximate DCT for image encoding in visual sensor networks requiring only ten additions., , , and . J. Real Time Image Process., 17 (5): 1597-1608 (2020)