Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Compromised Readers Meet RFID., , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 36-50. Springer, (2009)Untangling RFID Privacy Models., and . J. Comput. Networks Commun., (2013)Towards a Formal IoT Security Model., , , , and . Symmetry, 12 (8): 1305 (2020)Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps., , , , and . Wirel. Commun. Mob. Comput., (2020)Sharing pandemic vaccination certificates through blockchain: Case study and performance evaluation., , , , , and . CoRR, (2021)Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly., , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 103-122. Springer, (2010)Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols., , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 138-157. Springer, (2010)Untraceability Model for RFID., , and . IEEE Trans. Mob. Comput., 13 (10): 2397-2405 (2014)A privacy-restoring mechanism for offline RFID systems., , and . WISEC, page 63-74. ACM, (2012)CLEAR.TEXT Enhancing the Modernization Public Sector Organizations by Deploying Natural Language Processing to Make Their Digital Content CLEARER to Those with Cognitive Disabilities., , , , , , , and . SEPLN (Projects and Demonstrations), volume 3516 of CEUR Workshop Proceedings, page 41-44. CEUR-WS.org, (2023)