Author of the publication

Subscriber Centric Conditional Access System for Pay-TV Systems.

, , , and . ICEBE, page 450-455. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems., , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 288-304. Springer, (2013)A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 102-110. Springer, (2013)Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks., , , , , and . CoRR, (2016)Practical Attacks on Virtual Worlds., , , and . CRiSIS, volume 8924 of Lecture Notes in Computer Science, page 180-195. Springer, (2014)Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators., , and . ICICS, volume 8233 of Lecture Notes in Computer Science, page 151-166. Springer, (2013)Recovering from a lost digital wallet: A smart cards perspective extended abstract., , and . Pervasive Mob. Comput., (2016)Application Management Framework in User Centric Smart Card Ownership Model., , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 20-35. Springer, (2009)Tokenisation Blacklisting Using Linkable Group Signatures., , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 182-198. Springer, (2016)Preventing relay attacks in mobile transactions using infrared light., , , and . SAC, page 1724-1731. ACM, (2017)Philanthropy on the Blockchain., , , , and . WISTP, volume 10741 of Lecture Notes in Computer Science, page 25-38. Springer, (2017)