Author of the publication

Probabilistic Analysis of Blocking Attack in RFID Systems.

, , , , and . IEEE Trans. Inf. Forensics Secur., 6 (3-1): 803-817 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximations for the probability in the tails of the binomial distribution., and . IEEE Trans. Inf. Theory, 33 (3): 426-428 (1987)Addresses for graphs., and . IEEE Trans. Inf. Theory, 19 (5): 683-688 (1973)Coding with Permutations, , and . Inf. Control., 43 (1): 1-19 (October 1979)On the Trellis Complexity of the Densest Lattice Packings in Rn., and . SIAM J. Discret. Math., 9 (4): 597-601 (1996)LDPC and Gallager codes over finite fields., and . Handbook of Finite Fields, CRC Press, (2013)Raptor codes., and . Handbook of Finite Fields, CRC Press, (2013)VSH and multiplicative modular relations between small primes with polynomial exponents., , and . Appl. Algebra Eng. Commun. Comput., 25 (3): 181-188 (2014)On Short Cycle Enumeration in Biregular Bipartite Graphs., and . IEEE Trans. Inf. Theory, 64 (10): 6526-6535 (2018)Quasi-cyclic LDPC codes on Latin squares and the ranks of their parity-check matrices., , , , and . ITA, page 16-22. IEEE, (2010)On the bit security of the Diffie-Hellman key., , and . Appl. Algebra Eng. Commun. Comput., 16 (6): 397-404 (2006)