From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks., и . SPC, том 3450 из Lecture Notes in Computer Science, стр. 86-100. Springer, (2005)Technologies for controlled anonymity, , , , , , , , , и 1 other автор(ы). Deliverable 10. Anonymity and Privacy in Electronic Services, (2003)The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks., и . ICDCS Workshops, стр. 916-922. IEEE Computer Society, (2005)Power consumption evaluation of efficient digital signature schemes for low power devices., и . WiMob (1), стр. 79-86. IEEE, (2005)Privacy-Preserving ECC-Based Grouping Proofs for RFID., , , , и . ISC, том 6531 из Lecture Notes in Computer Science, стр. 159-165. Springer, (2010)ARM: anonymous routing protocol for mobile ad hoc networks., и . Int. J. Wirel. Mob. Comput., 3 (3): 145-155 (2009)Hierarchical ECC-Based RFID Authentication Protocol., , , и . RFIDSec, том 7055 из Lecture Notes in Computer Science, стр. 183-201. Springer, (2011)Towards Measuring Anonymity., , , и . Privacy Enhancing Technologies, том 2482 из Lecture Notes in Computer Science, стр. 54-68. Springer, (2002)Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs., , , , и . Personal and Ubiquitous Computing, 16 (3): 323-335 (2012)User Privacy in RFID Networks., и . ISSE, стр. 206-215. Vieweg+Teubner, (2009)