Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery., and . CEC, page 1420-1427. IEEE, (2017)A secure distance-based RFID identification protocol with an off-line back-end database., , , and . Pers. Ubiquitous Comput., 16 (3): 351-365 (2012)Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard., , and . IEICE Trans. Inf. Syst., 93-D (3): 518-527 (2010)Vulnerability analysis of RFID protocols for tag ownership transfer., , , , and . Comput. Networks, 54 (9): 1502-1508 (2010)No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (11): 2640-2653 (2017)Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts., , , and . Sensors, 18 (9): 2804 (2018)Smartphone image acquisition forensics using sensor fingerprint., , , , , and . IET Comput. Vis., 9 (5): 723-731 (2015)New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?, , , , and . EICC, page 13-18. ACM, (2023)Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications., , , and . ICISSP, page 389-401. SciTePress, (2023)On the Unbearable Lightness of FIPS 140-2 Randomness Tests., , and . IEEE Trans. Inf. Forensics Secur., (2022)