Author of the publication

Improving authentication of remote card transactions with mobile personal trusted devices.

, and . Comput. Commun., 30 (8): 1697-1712 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance and Security Evaluation of SDN Networks in OMNeT++/INET., , and . CoRR, (2016)An Algorithm for Reconnecting Wireless Sensor Network Partitions., , and . EWSN, volume 4913 of Lecture Notes in Computer Science, page 253-267. Springer, (2008)Assessing the Cost of Quantum Security for Automotive Over -The-Air Updates., , , and . ISCC, page 1-6. IEEE, (2021)A cryptographic suite for underwater cooperative applications., and . ISCC, page 870-875. IEEE Computer Society, (2011)Decentralized intrusion detection for secure cooperative multi-agent systems., , , , and . CDC, page 1553-1558. IEEE, (2007)Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems., , , , and . CASE, page 454-459. IEEE, (2007)Improving authentication of remote card transactions with mobile personal trusted devices., and . Comput. Commun., 30 (8): 1697-1712 (2007)A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems., and . MESAS, volume 8906 of Lecture Notes in Computer Science, page 77-94. Springer, (2014)Protected pointers in wireless sensor networks., and . Int. J. Ad Hoc Ubiquitous Comput., 24 (3): 204-212 (2017)Consensus-based distributed intrusion detection for multi-robot systems., , , , and . ICRA, page 120-127. IEEE, (2008)