Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacks and improvements to an RIFD mutual authentication protocol and its extensions., , , and . WISEC, page 51-58. ACM, (2009)Video stream authentication in lossy networks., and . WCNC, page 2150-2155. IEEE, (2006)Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains., , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 150-164. Springer, (2009)The security and improvement of an ultra-lightweight RFID authentication protocol., , and . Secur. Commun. Networks, 1 (2): 135-146 (2008)Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme., and . GLOBECOM, page 59-63. IEEE, (2007)Insights into Malware Detection and Prevention on Mobile Phones., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 242-249. Springer, (2009)LITESET/A++: A New Agent-Assisted Secure Payment Protocol., and . CEC, page 244-251. IEEE Computer Society, (2004)Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN., , , , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 79-91. Springer, (2004)Dynamic Access Control for Multi-privileged Group Communications., , , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 508-519. Springer, (2004)Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol., , , , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 427-442. Springer, (2010)