Author of the publication

Weak-Unforgeable Tags for Secure Supply Chain Management.

, , , , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 80-98. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Markov Modeling of Moving Target Defense Games., , , , and . MTD@CCS, page 81-92. ACM, (2016)New clone-detection approach for RFID-based supply chains., , , and . HOST, page 122-127. IEEE Computer Society, (2017)Securing Pseudonym Schemes for Vehicular Privacy., , and . IEEE Big Data, page 6647-6649. IEEE, (2022)Privacy-Preserving Framework to Facilitate Shared Data Access for Wearable Devices., , , , , , and . IEEE BigData, page 2583-2592. IEEE, (2021)SecFob: A Remote Keyless Entry Security Solution., , , , and . ISC2, page 1-7. IEEE, (2023)Markov Modeling of Moving Target Defense Games., , , , and . IACR Cryptology ePrint Archive, (2016)Weak-Unforgeable Tags for Secure Supply Chain Management., , , , and . IACR Cryptology ePrint Archive, (2017)A metric for the stiffness of calcified aortic valves using a combined computational and experimental approach., , , , and . Medical Biol. Eng. Comput., 52 (1): 1-8 (2014)On the Universally Composable Security of OpenStack., , , , , , , and . SecDev, page 20-33. IEEE, (2019)Deep Learning meets Blockchain for Automated and Secure Access Control., , , and . CoRR, (2023)