Author of the publication

Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints.

, , , , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 278-292. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On extremal multiplicative Zagreb indices of trees with given domination number., , and . Appl. Math. Comput., (2018)NeRF-MS: Neural Radiance Fields with Multi-Sequence., , , , , and . ICCV, page 18545-18554. IEEE, (2023)A Causality Analysis Framework for Component-Based Real-Time Systems., , , , , and . RV, volume 8174 of Lecture Notes in Computer Science, page 285-303. Springer, (2013)A Safety-Assured Development Approach for Real-Time Software., , , , , and . RTCSA, page 133-142. IEEE Computer Society, (2010)Construction of Lightweight Certificate-Based Signature and Application in Cloud Computing., and . CWSN, volume 418 of Communications in Computer and Information Science, page 61-70. Springer, (2013)Security analysis of two lightweight RFID authentication protocols., , , and . Ann. des Télécommunications, 69 (5-6): 273-282 (2014)Preimage Attack on Hash Function RIPEMD., and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 274-284. Springer, (2009)Runtime Verification of Traces under Recording Uncertainty., , , and . RV, volume 7186 of Lecture Notes in Computer Science, page 442-456. Springer, (2011)Aggregate and Separate of Signatures in Wireless Network., and . AINA Workshops, page 428-433. IEEE Computer Society, (2008)Modification and Improvement on Group Signature Scheme without Random Oracles.. ISECS, page 462-466. IEEE Computer Society, (2008)