Author of the publication

Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions.

, and . ISC, volume 3225 of Lecture Notes in Computer Science, page 342-353. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Slave Devices to Active Network Peers.. International Conference on Internet Computing, page 66-74. CSREA Press, (2005)Protecting Resource-Constrained Network Devices from Denial-of-Service Attacks.. Security and Management, page 63-67. CSREA Press, (2010)Making Smart Cards Truly Portable., and . IEEE Secur. Priv., 8 (2): 28-34 (2010)Network smart card review and analysis.. Comput. Networks, 51 (9): 2234-2248 (2007)Adaptive Visualization for Interactive Geometric Modeling in Geoscience., and . WSCG, (2000)Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions., and . ISC, volume 3225 of Lecture Notes in Computer Science, page 342-353. Springer, (2004)Communication Security between a Computer and a Hardware Token., and . ICONS, page 220-225. IEEE Computer Society, (2008)Multi-stage Packet Filtering in Network Smart Cards.. CARDIS, volume 3928 of Lecture Notes in Computer Science, page 192-205. Springer, (2006)A New Secure Communication Framework for Smart Cards., , , and . CCNC, page 1-5. IEEE, (2009)Keeping Your API Keys in a Safe.. IEEE CLOUD, page 962-965. IEEE Computer Society, (2014)