From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Privacy Enhancing Beacon Scheme in V2X Communication., , и . DPM/CBT@ESORICS, том 13140 из Lecture Notes in Computer Science, стр. 139-151. Springer, (2021)Security and Privacy Threat Analysis for Solid., , , , , и . SecDev, стр. 196-206. IEEE, (2023)Key Establishment Using Secure Distance Bounding Protocols., и . MobiQuitous, стр. 1-6. IEEE Computer Society, (2007)FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices., , , и . CARDIS, том 13173 из Lecture Notes in Computer Science, стр. 289-309. Springer, (2021)Privacy-Preserving ECC-Based Grouping Proofs for RFID., , , , и . ISC, том 6531 из Lecture Notes in Computer Science, стр. 159-165. Springer, (2010)Location verification using secure distance bounding protocols., и . MASS, IEEE Computer Society, (2005)Supply Chain Insecurity: The Lack of Integrity Protection in SBOM Solutions., , и . CoRR, (2024)Security-Focused Training Model of Reinforcement Learning in Autonomous Vehicles., , , , , и . VNC, стр. 215-218. IEEE, (2024)On the Feasibility of Cryptography for a Wireless Insulin Pump System., , , , и . CODASPY, стр. 113-120. ACM, (2016)Hierarchical ECC-Based RFID Authentication Protocol., , , и . RFIDSec, том 7055 из Lecture Notes in Computer Science, стр. 183-201. Springer, (2011)