Author of the publication

Application Management Framework in User Centric Smart Card Ownership Model.

, , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 20-35. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of dynamic biometrie security characteristics against other biometrics., , , and . ICC, page 1-7. IEEE, (2017)A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA., , and . ICITST, page 44-51. IEEE, (2013)Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones., , , and . RFIDSec Asia, volume 8 of Cryptology and Information Security Series, page 21-32. IOS Press, (2012)Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones., , , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 35-49. Springer, (2010)Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms., , , and . ICITST, page 1-8. IEEE, (2009)A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies., , and . WISTP, volume 4462 of Lecture Notes in Computer Science, page 161-174. Springer, (2007)A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism., , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 161-172. Springer, (2010)Select-Response Grouping Proof for RFID Tags., , , , and . ACIIDS, page 73-77. IEEE Computer Society, (2009)Let's Get Mobile: Secure FOTA for Automotive System., , , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 503-510. Springer, (2015)Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture., , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 214-227. Springer, (2012)