From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Privacy Enhancing Beacon Scheme in V2X Communication., , и . DPM/CBT@ESORICS, том 13140 из Lecture Notes in Computer Science, стр. 139-151. Springer, (2021)Privacy-Preserving ECC-Based Grouping Proofs for RFID., , , , и . ISC, том 6531 из Lecture Notes in Computer Science, стр. 159-165. Springer, (2010)Key Establishment Using Secure Distance Bounding Protocols., и . MobiQuitous, стр. 1-6. IEEE Computer Society, (2007)Security-Focused Training Model of Reinforcement Learning in Autonomous Vehicles., , , , , и . VNC, стр. 215-218. IEEE, (2024)Location verification using secure distance bounding protocols., и . MASS, IEEE Computer Society, (2005)FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices., , , и . CARDIS, том 13173 из Lecture Notes in Computer Science, стр. 289-309. Springer, (2021)Security and Privacy Threat Analysis for Solid., , , , , и . SecDev, стр. 196-206. IEEE, (2023)Hierarchical ECC-Based RFID Authentication Protocol., , , и . RFIDSec, том 7055 из Lecture Notes in Computer Science, стр. 183-201. Springer, (2011)A Survey of Security and Privacy Issues in V2X Communication Systems., , , , , , и . CoRR, (2022)A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network., , , , , , , , , и 1 other автор(ы). CANS, том 11261 из Lecture Notes in Computer Science, стр. 347-369. Springer, (2017)