Author of the publication

Subscriber Centric Conditional Access System for Pay-TV Systems.

, , , and . ICEBE, page 450-455. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recovering from a lost digital wallet: A smart cards perspective extended abstract., , and . Pervasive Mob. Comput., (2016)Tokenisation Blacklisting Using Linkable Group Signatures., , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 182-198. Springer, (2016)Application Management Framework in User Centric Smart Card Ownership Model., , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 20-35. Springer, (2009)Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay., , , , and . CPSS@AsiaCCS, page 21-32. ACM, (2017)Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems., , , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 3-16. Springer, (2020)The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems., , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 288-304. Springer, (2013)A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 102-110. Springer, (2013)Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks., , , , , and . CoRR, (2016)Preventing relay attacks in mobile transactions using infrared light., , , and . SAC, page 1724-1731. ACM, (2017)Practical Attacks on Virtual Worlds., , , and . CRiSIS, volume 8924 of Lecture Notes in Computer Science, page 180-195. Springer, (2014)