From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attack and defense mechanisms of malicious EPC event injection in EPC discovery service., , и . RFID-TA, стр. 1-6. IEEE, (2013)An attribute-based access matrix model., , и . SAC, стр. 359-363. ACM, (2005)A Privacy-Enhanced Microaggregation Method., , , и . FoIKS, том 2284 из Lecture Notes in Computer Science, стр. 148-159. Springer, (2002)Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains., , и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 501-512. Springer, (2012)Unlinkable and Revocable Secret Handshake., , , и . Comput. J., 64 (8): 1303-1314 (2021)A study on a feasible no-root approach on Android., , , , и . J. Comput. Secur., 25 (3): 231-253 (2017)Protecting RFID communications in supply chains., и . AsiaCCS, стр. 234-241. ACM, (2007)Privacy-Preserving Remote User Authentication with k-Times Untraceability., , , , , и . Inscrypt, том 11449 из Lecture Notes in Computer Science, стр. 647-657. Springer, (2018)Two robust remote user authentication protocols using smart cards., , , , и . J. Syst. Softw., 83 (12): 2556-2565 (2010)Lattice-Based Remote User Authentication from Reusable Fuzzy Signature., , , , и . IACR Cryptology ePrint Archive, (2019)