Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols., and . SEC, volume 232 of IFIP, page 109-120. Springer, (2007)Resilient Aggregation Scheme for Confidential Sensor Reports., and . ICC, page 1472-1477. IEEE, (2007)Adaptive Stream Authentication for Wireless Multimedia Communications., and . WCNC, page 2613-2618. IEEE, (2007)PreCrime to the rescue: defeating mobile malware one-step ahead., , , , , and . APSys, page 5:1-5:7. ACM, (2014)Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks., , and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 200-209. Springer, (2005)Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains., , , , and . ICISS, volume 6503 of Lecture Notes in Computer Science, page 246-260. Springer, (2010)Authenticated CAN Communications Using Standardized Cryptographic Techniques., , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 330-343. (2016)RFID privacy: relation between two notions, minimal condition, and efficient construction., , , and . ACM Conference on Computer and Communications Security, page 54-65. ACM, (2009)A software-based root-of-trust primitive on multicore platforms., , , , and . AsiaCCS, page 334-343. ACM, (2011)Secure and Practical Key Distribution for RFID-Enabled Supply Chains., , and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 356-372. Springer, (2011)