From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols., и . SEC, том 232 из IFIP, стр. 109-120. Springer, (2007)Resilient Aggregation Scheme for Confidential Sensor Reports., и . ICC, стр. 1472-1477. IEEE, (2007)RFID privacy: relation between two notions, minimal condition, and efficient construction., , , и . ACM Conference on Computer and Communications Security, стр. 54-65. ACM, (2009)PreCrime to the rescue: defeating mobile malware one-step ahead., , , , , и . APSys, стр. 5:1-5:7. ACM, (2014)Adaptive Stream Authentication for Wireless Multimedia Communications., и . WCNC, стр. 2613-2618. IEEE, (2007)Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains., , , , и . ICISS, том 6503 из Lecture Notes in Computer Science, стр. 246-260. Springer, (2010)Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks., , и . Communications and Multimedia Security, том 3677 из Lecture Notes in Computer Science, стр. 200-209. Springer, (2005)A software-based root-of-trust primitive on multicore platforms., , , , и . AsiaCCS, стр. 334-343. ACM, (2011)Secure and Practical Key Distribution for RFID-Enabled Supply Chains., , и . SecureComm, том 96 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 356-372. Springer, (2011)Authenticated CAN Communications Using Standardized Cryptographic Techniques., , и . ISPEC, том 10060 из Lecture Notes in Computer Science, стр. 330-343. (2016)