Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model., , , and . IACR Cryptology ePrint Archive, (2013)Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels., and . Wirel. Commun. Mob. Comput., 8 (9): 1227-1232 (2008)HB-MP: A further step in the HB-family of lightweight authentication protocols., and . Comput. Networks, 51 (9): 2262-2267 (2007)Ensembles of Deep Learning Architectures for the Early Diagnosis of the Alzheimer's Disease., , , and . Int. J. Neural Syst., 26 (7): 1650025:1-1650025:23 (2016)Performance Study of Ant Colony Optimization for Feature Selection in EEG Classification., , , , , , and . BIOMESIP, volume 12940 of Lecture Notes in Computer Science, page 323-336. Springer, (2021)An anonymous RFID grouping-proof with missing tag identification., and . IEEE RFID, page 146-152. IEEE, (2016)Security Analysis of Tu and Piramuthu's Protocol., and . NTMS, page 1-5. IEEE, (2008)Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments., , and . Comput. Commun., (2016)Security flaw of Hölbl et al.'s protocol., and . Comput. Commun., 32 (4): 736-739 (2009)Enhanced Computation of the EEG-IC Polarities using a Genetic Algorithm., , , and . IIAI-AAI, page 319-324. IEEE, (2022)