From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey., , и . SN Comput. Sci., 3 (5): 382 (2022)A privacy-preserving code-based authentication protocol for Internet of Things., , , и . J. Supercomput., 75 (12): 8231-8261 (2019)Algebraic Replay Attacks on Authentication in RFID Protocols., , и . SecNet, том 381 из Communications in Computer and Information Science, стр. 153-163. Springer, (2013)An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System, , и . CoRR, (2012)Weaknesses in Two RFID Authentication Protocols., , , и . C2SI, том 9084 из Lecture Notes in Computer Science, стр. 162-172. Springer, (2015)An efficient privacy scheme for C-ITS stations., , и . Comput. Electr. Eng., (апреля 2023)RFID Authentication Protocols Based on Error-Correcting Codes: A Survey., , , и . Wireless Personal Communications, 96 (1): 509-527 (2017)Performance Evaluation of Post-quantum Public-Key Cryptography in Smart Mobile Devices., и . I3E, том 11195 из Lecture Notes in Computer Science, стр. 67-80. Springer, (2018)A comparative analysis of RFID authentication protocols for healthcare applications., и . AI-CSP, стр. 1-6. IEEE, (2021)Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem., , , и . Int. J. Netw. Secur., 17 (4): 413-422 (2015)