From post

Secure and Practical Key Distribution for RFID-Enabled Supply Chains.

, , и . SecureComm, том 96 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 356-372. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An attribute-based access matrix model., , и . SAC, стр. 359-363. ACM, (2005)Lattice-Based Remote User Authentication from Reusable Fuzzy Signature., , , , и . IACR Cryptology ePrint Archive, (2019)Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains., , и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 501-512. Springer, (2012)A Privacy-Enhanced Microaggregation Method., , , и . FoIKS, том 2284 из Lecture Notes in Computer Science, стр. 148-159. Springer, (2002)Attack and defense mechanisms of malicious EPC event injection in EPC discovery service., , и . RFID-TA, стр. 1-6. IEEE, (2013)Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains., , , , и . ICISS, том 6503 из Lecture Notes in Computer Science, стр. 246-260. Springer, (2010)A study on a feasible no-root approach on Android., , , , и . J. Comput. Secur., 25 (3): 231-253 (2017)Protecting RFID communications in supply chains., и . AsiaCCS, стр. 234-241. ACM, (2007)Unlinkable and Revocable Secret Handshake., , , и . Comput. J., 64 (8): 1303-1314 (2021)Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption., , , и . AsiaCCS, стр. 239-248. ACM, (2014)