From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices., , , и . CARDIS, том 13173 из Lecture Notes in Computer Science, стр. 289-309. Springer, (2021)A survey on physiological-signal-based security for medical devices., , , и . IACR Cryptology ePrint Archive, (2016)Security and Privacy Threat Analysis for Solid., , , , , и . SecDev, стр. 196-206. IEEE, (2023)Privacy-Preserving ECC-Based Grouping Proofs for RFID., , , , и . ISC, том 6531 из Lecture Notes in Computer Science, стр. 159-165. Springer, (2010)A New Privacy Enhancing Beacon Scheme in V2X Communication., , и . DPM/CBT@ESORICS, том 13140 из Lecture Notes in Computer Science, стр. 139-151. Springer, (2021)Key Establishment Using Secure Distance Bounding Protocols., и . MobiQuitous, стр. 1-6. IEEE Computer Society, (2007)Location verification using secure distance bounding protocols., и . MASS, IEEE Computer Society, (2005)Low-cost untraceable authentication protocols for RFID., , , и . WISEC, стр. 55-64. ACM, (2010)Location privacy in wireless personal area networks., и . Workshop on Wireless Security, стр. 11-18. ACM, (2006)DASLog: Decentralized Auditable Secure Logging for UAV Ecosystems., , , и . IEEE Internet Things J., 10 (23): 20264-20284 (декабря 2023)