Author of the publication

On the Security of Tan et al. Serverless RFID Authentication and Search Protocols.

, , , , and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 1-19. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things., and . IACR Cryptology ePrint Archive, (2016)A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments., , , , , , , and . IEEE Access, (2020)Desynchronization and Traceability Attacks on RIPTA-DA Protocol., , , and . RFIDSec, volume 8262 of Lecture Notes in Computer Science, page 57-68. Springer, (2013)Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6"., , , and . IEEE Communications Letters, 17 (4): 805-807 (2013)On the Security of Tan et al. Serverless RFID Authentication and Search Protocols., , , , and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 1-19. Springer, (2012)Questioning the Security of Three Recent Authentication and Key Agreement Protocols., , , , , , , and . IEEE Access, (2021)A New Secure Authentication Protocol for Telecare Medicine Information System and Smart Campus., and . IEEE Access, (2019)Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol., , , and . J. Comput. Appl. Math., (2014)Security Analysis of Niu et al. Authentication and Ownership Management Protocol., , and . RFIDSec, volume 10155 of Lecture Notes in Computer Science, page 3-16. Springer, (2016)Relaxed Differential Fault Analysis of SHA-3., , and . ISeCure, 11 (2): 129-143 (2019)