Author of the publication

Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach.

, , , and . ICCSA (3), volume 3482 of Lecture Notes in Computer Science, page 729-738. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving hash functions by means of genetic programming, , , and . GECCO 2006: Proceedings of the 8th annual conference on Genetic and evolutionary computation, 2, page 1861--1862. Seattle, Washington, USA, ACM Press, (8-12 July 2006)Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming, , , and . Parallel Problem Solving from Nature - PPSN IX, volume 4193 of LNCS, page 818--827. Reykjavik, Iceland, Springer-Verlag, (9-13 September 2006)Fuzzy logic on decision model for IDS., , and . FUZZ-IEEE, page 1237-1242. IEEE, (2003)Evolution, Detection and Analysis of Malware for Smart Devices., , , and . IEEE Commun. Surv. Tutorials, 16 (2): 961-987 (2014)Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard., , , and . Comput. Stand. Interfaces, 31 (2): 372-380 (2009)Leveraging User-related Internet of Things for Continuous Authentication: A Survey., , and . ACM Comput. Surv., 52 (3): 53:1-53:38 (2019)A Multi-party Rational Exchange Protocol., , , and . OTM Workshops (1), volume 4805 of Lecture Notes in Computer Science, page 42-43. Springer, (2007)Protection of Multiagent Systems., , , and . ICCSA (3), volume 2669 of Lecture Notes in Computer Science, page 123-128. Springer, (2003)Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial Proposal., , , and . INC, page 159-168. University of Plymouth, (2010)Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags., , , and . SECPerU, page 55-60. IEEE Computer Society, (2007)