Author of the publication

Achieving high security and efficiency in RFID-tagged supply chains.

, , , , and . Int. J. Appl. Cryptogr., 2 (1): 3-12 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers., , , , , and . WISEC, page 6:1-6:6. ACM, (2015)TeleOph: a secure real-time teleophthalmology system., , , , , , and . IEEE Trans. Information Technology in Biomedicine, 14 (5): 1259-1266 (2010)A Secure, Usable, and Transparent Middleware for Permission Managers on Android., , , , , and . IEEE Trans. Dependable Secur. Comput., 14 (4): 350-362 (2017)Evaluating a Multimedia-Based Tele-Ophthalmology System., , and . PCM, volume 5879 of Lecture Notes in Computer Science, page 1125-1130. Springer, (2009)Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators., , and . SEC, volume 278 of IFIP, page 47-61. Springer, (2008)Achieving high security and efficiency in RFID-tagged supply chains., , , , and . Int. J. Appl. Cryptogr., 2 (1): 3-12 (2010)