Author of the publication

An anonymous RFID grouping-proof with missing tag identification.

, and . IEEE RFID, page 146-152. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels., and . Wirel. Commun. Mob. Comput., 8 (9): 1227-1232 (2008)Performance Study of Ant Colony Optimization for Feature Selection in EEG Classification., , , , , , and . BIOMESIP, volume 12940 of Lecture Notes in Computer Science, page 323-336. Springer, (2021)An anonymous RFID grouping-proof with missing tag identification., and . IEEE RFID, page 146-152. IEEE, (2016)Security Analysis of Tu and Piramuthu's Protocol., and . NTMS, page 1-5. IEEE, (2008)Enhanced Computation of the EEG-IC Polarities using a Genetic Algorithm., , , and . IIAI-AAI, page 319-324. IEEE, (2022)Identifying the diffusion source of dementia spreading in structural brain networks., , , , , , and . Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging, volume 11600 of SPIE Proceedings, SPIE, (2021)What can RFID do for Vanets? - A Cryptographic Point of View., , and . SECRYPT, page 295-298. SciTePress, (2010)Isosurface Modelling of DatSCAN Images for Parkinson Disease Diagnosis., , , , , and . IWINAC (1), volume 11486 of Lecture Notes in Computer Science, page 360-368. Springer, (2019)Improving the Period and Linear Span of the Sequences Generated by DLFSRs., , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 397-406. Springer, (2014)Secure EPC Gen2 Compliant Radio Frequency Identification., , , and . ADHOC-NOW, volume 5793 of Lecture Notes in Computer Science, page 227-240. Springer, (2009)