Author of the publication

Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol.

, , , , and . IPDPS, page 1-5. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing the Forensic Footprint with Android Accessibility Attacks., , , and . STM, volume 12386 of Lecture Notes in Computer Science, page 22-38. Springer, (2020)Using Eyetracker to Find Ways to Mitigate Ransomware., , , and . ICISSP, page 448-456. SCITEPRESS, (2020)Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments., , , , and . SEWCN, volume 42 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 25-35. Springer, (2009)A Survey of Security and Privacy Issues in ePassport Protocols., , , , and . ACM Comput. Surv., 48 (3): 47:1-47:37 (2016)Detecting discussion communities on vaccination in twitter., , and . Future Gener. Comput. Syst., (2017)Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming., , , and . IEEE Congress on Evolutionary Computation, page 192-199. IEEE, (2006)Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android., , , and . SECRYPT, page 356-369. SCITEPRESS, (2021)A Roadmap for Improving the Impact of Anti-ransomware Research., , , , and . NordSec, volume 11875 of Lecture Notes in Computer Science, page 137-154. Springer, (2019)Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming, , , and . Proceedings of the 2006 IEEE Congress on Evolutionary Computation, page 499--506. Vancouver, IEEE Press, (6-21 July 2006)Automated design of a lightweight block cipher with Genetic Programming, , , and . International Journal of Knowledge-Based and Intelligent Engineering Systems, 12 (1): 3--14 (2008)