Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher., , and . J. Inform. and Commun. Convergence Engineering, 12 (4): 237-245 (2014)Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach., , , and . Sensors, 19 (22): 4952 (2019)Hybrid Cloud Service Based Healthcare Solutions., , , , and . AINA Workshops, page 25-30. IEEE Computer Society, (2015)Data Link Layer' Security Analysis for Wireless Sensor Networks., , and . FGIT-FGCN/DCA, volume 350 of Communications in Computer and Information Science, page 25-32. Springer, (2012)A hybrid and fast authentication protocol for handoff support in e-healthcare systems among WSNs., , and . ICTC, page 72-77. IEEE, (2013)Anonymization algorithm for security and confidentiality of health data set across social network., and . ICTC, page 65-70. IEEE, (2014)On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis., , , , and . AINA, page 498-505. IEEE Computer Society, (2015)Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator., , , , and . AINA, page 506-509. IEEE Computer Society, (2015)Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks., and . ICOIN, page 578-582. IEEE Computer Society, (2014)Smartphone-Based Secure Access Control in Wireless Network Analysis., , , , and . AINA Workshops, page 344-347. IEEE Computer Society, (2015)