Author of the publication

New clone-detection approach for RFID-based supply chains.

, , , and . HOST, page 122-127. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion., , , and . IACR Cryptology ePrint Archive, (2018)MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks., , , , and . IACR Cryptology ePrint Archive, (2017)HaTCh: Hardware Trojan Catcher., , , , , and . IACR Cryptology ePrint Archive, (2014)Secure and Efficient Initialization and Authentication Protocols for SHIELD., and . IACR Cryptology ePrint Archive, (2015)A Survey of Cybersecurity and Resilience of Digital Manufacturing., , , , , , , and . CoRR, (2020)PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers., , , , and . IACR Trans. Symmetric Cryptol., 2021 (3): 170-217 (2021)Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems., , and . ICPS, page 824-829. IEEE, (2018)New clone-detection approach for RFID-based supply chains., , , and . HOST, page 122-127. IEEE Computer Society, (2017)Simulation and analysis of negative-bias temperature instability aging on power analysis attacks., , , , and . HOST, page 124-129. IEEE Computer Society, (2015)Proof of aliveness., , , and . ACSAC, page 1-16. ACM, (2019)