From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices., , и . WISA, том 5932 из Lecture Notes in Computer Science, стр. 163-177. Springer, (2009)Susceptibility of UHF RFID Tags to Electromagnetic Analysis.. CT-RSA, том 4964 из Lecture Notes in Computer Science, стр. 288-300. Springer, (2008)Side-Channel Leakage across Borders., , , , , и . CARDIS, том 6035 из Lecture Notes in Computer Science, стр. 36-48. Springer, (2010)Semi-passive RFID development platform for implementing and attacking security tags., , , , , и . ICITST, стр. 1-6. IEEE, (2010)An ECDSA Processor for RFID Authentication., , и . RFIDSec, том 6370 из Lecture Notes in Computer Science, стр. 189-202. Springer, (2010)Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography., , , , и . IEEE Trans. Very Large Scale Integr. Syst., 21 (11): 1965-1974 (2013)On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems., , и . ARES, стр. 230-235. IEEE Computer Society, (2013)On Measuring the Parasitic Backscatter of Sensor-Enabled UHF RFID Tags., и . ARES, стр. 38-46. IEEE Computer Society, (2012)Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps., , и . ARES, стр. 169-177. IEEE Computer Society, (2013)EM Leakage of RFID Devices - Comparison of Two Measurement Approaches., и . ARES, стр. 120-125. IEEE Computer Society, (2014)