Author of the publication

Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.

, , , and . SECPerU, page 55-60. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery., and . CEC, page 1420-1427. IEEE, (2017)Vulnerability analysis of RFID protocols for tag ownership transfer., , , , and . Comput. Networks, 54 (9): 1502-1508 (2010)A secure distance-based RFID identification protocol with an off-line back-end database., , , and . Pers. Ubiquitous Comput., 16 (3): 351-365 (2012)Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard., , and . IEICE Trans. Inf. Syst., 93-D (3): 518-527 (2010)Theia: a tool for the forensic analysis of mobile devices pictures., , , , and . Computing, 98 (12): 1251-1286 (2016)No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (11): 2640-2653 (2017)Smartphone image acquisition forensics using sensor fingerprint., , , , , and . IET Comput. Vis., 9 (5): 723-731 (2015)Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications., , , and . ICISSP, page 389-401. SciTePress, (2023)New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?, , , , and . EICC, page 13-18. ACM, (2023)Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns., , , and . Sensors, 18 (10): 3372 (2018)