From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attack and defense mechanisms of malicious EPC event injection in EPC discovery service., , и . RFID-TA, стр. 1-6. IEEE, (2013)An attribute-based access matrix model., , и . SAC, стр. 359-363. ACM, (2005)Protecting RFID communications in supply chains., и . AsiaCCS, стр. 234-241. ACM, (2007)Privacy-Preserving Remote User Authentication with k-Times Untraceability., , , , , и . Inscrypt, том 11449 из Lecture Notes in Computer Science, стр. 647-657. Springer, (2018)A Robust Damage Assessment Model for Corrupted Database Systems., , и . ICISS, том 5905 из Lecture Notes in Computer Science, стр. 237-251. Springer, (2009)RFID privacy: relation between two notions, minimal condition, and efficient construction., , , и . ACM Conference on Computer and Communications Security, стр. 54-65. ACM, (2009)Lattice-Based Remote User Authentication from Reusable Fuzzy Signature., , , , и . IACR Cryptology ePrint Archive, (2019)Two robust remote user authentication protocols using smart cards., , , , и . J. Syst. Softw., 83 (12): 2556-2565 (2010)Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains., , , , и . ICISS, том 6503 из Lecture Notes in Computer Science, стр. 246-260. Springer, (2010)A Privacy-Enhanced Microaggregation Method., , , и . FoIKS, том 2284 из Lecture Notes in Computer Science, стр. 148-159. Springer, (2002)