Author of the publication

Secure and efficient random functions with variable-length output.

, , , , and . J. Netw. Comput. Appl., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware., , , , and . IEEE Trans. Inf. Forensics Secur., 10 (11): 2270-2283 (2015)A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems., and . Secur. Commun. Networks, 7 (12): 2684-2695 (2014)The Horizontal INR Conflict-Detection Algorithm: Revealing INR Reallocation and Reauthorization in RPKI., , , and . IM, page 459-465. IEEE, (2021)Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks., , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 73-86. Springer, (2017)A Context-Aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems., and . ICCCN, page 1-6. IEEE, (2011)Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data., , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 379-396. Springer, (2012)A Subjective Study on Videos at Various Bit Depths., , , and . PCS, page 1-5. IEEE, (2021)Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks., , , , , and . IEEE Trans. Emerg. Top. Comput., 1 (2): 307-318 (2013)A CNN-transformer hybrid approach for an intrusion detection system in advanced metering infrastructure., , , , and . Multim. Tools Appl., 82 (13): 19463-19486 (May 2023)PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones., , , , , , and . IEEE Internet Things J., 1 (1): 33-45 (2014)