From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems., , и . SecureComm, том 127 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 288-304. Springer, (2013)A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags., , и . SEC, том 405 из IFIP Advances in Information and Communication Technology, стр. 102-110. Springer, (2013)Practical Attacks on Virtual Worlds., , , и . CRiSIS, том 8924 из Lecture Notes in Computer Science, стр. 180-195. Springer, (2014)Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks., , , , , и . CoRR, (2016)Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators., , и . ICICS, том 8233 из Lecture Notes in Computer Science, стр. 151-166. Springer, (2013)Preventing relay attacks in mobile transactions using infrared light., , , и . SAC, стр. 1724-1731. ACM, (2017)Recovering from a lost digital wallet: A smart cards perspective extended abstract., , и . Pervasive Mob. Comput., (2016)Application Management Framework in User Centric Smart Card Ownership Model., , и . WISA, том 5932 из Lecture Notes in Computer Science, стр. 20-35. Springer, (2009)Tokenisation Blacklisting Using Linkable Group Signatures., , , и . SecureComm, том 198 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 182-198. Springer, (2016)Philanthropy on the Blockchain., , , , и . WISTP, том 10741 из Lecture Notes in Computer Science, стр. 25-38. Springer, (2017)