From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments., , , , , , , и . IEEE Access, (2020)Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things., и . IACR Cryptology ePrint Archive, (2016)Desynchronization and Traceability Attacks on RIPTA-DA Protocol., , , и . RFIDSec, том 8262 из Lecture Notes in Computer Science, стр. 57-68. Springer, (2013)A New Secure Authentication Protocol for Telecare Medicine Information System and Smart Campus., и . IEEE Access, (2019)Questioning the Security of Three Recent Authentication and Key Agreement Protocols., , , , , , , и . IEEE Access, (2021)Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6"., , , и . IEEE Communications Letters, 17 (4): 805-807 (2013)On the Security of Tan et al. Serverless RFID Authentication and Search Protocols., , , , и . RFIDSec, том 7739 из Lecture Notes in Computer Science, стр. 1-19. Springer, (2012)Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol., , , и . J. Comput. Appl. Math., (2014)Security Analysis of Niu et al. Authentication and Ownership Management Protocol., , и . RFIDSec, том 10155 из Lecture Notes in Computer Science, стр. 3-16. Springer, (2016)Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI+ protocols., и . IACR Cryptology ePrint Archive, (2016)