Author of the publication

RFID and Contactless Technology.

, and . Smart Cards, Tokens, Security and Applications, 2nd Ed., Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation., , , , , and . IEEE Trans. Veh. Technol., 68 (5): 4834-4845 (2019)Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage., , , , and . IEEE Trans. Cloud Comput., 9 (1): 212-225 (2021)Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers., , , , and . Int. J. Bifurc. Chaos, 27 (10): 1750155:1-1750155:13 (2017)CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing., , , , , , , , and . IEEE Trans. Parallel Distributed Syst., 30 (6): 1251-1266 (2019)HB+DB: Distance bounding meets human based authentication., , , , and . Future Gener. Comput. Syst., (2018)GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks., , , , , and . IACR Cryptol. ePrint Arch., (2022)RFID and Contactless Technology., and . Smart Cards, Tokens, Security and Applications, 2nd Ed., Springer, (2017)An Identity-Based Strong Designated Verifier Dual-Signature Scheme With Constrained Delegatability., , , , , and . IEEE Internet Things J., 11 (10): 17552-17566 (May 2024)Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients., , , , , , and . CoRR, (2022)Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models., , , , , and . Future Gener. Comput. Syst., (2018)