From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks., , , , , и . CoRR, (2016)E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy., , и . CoRR, (2018)Attacking smart card systems: Theory and practice., , , , и . Inf. Secur. Tech. Rep., 14 (2): 46-56 (2009)Firewall Mechanism in a User Centric Smart Card Ownership Model., , и . CARDIS, том 6035 из Lecture Notes in Computer Science, стр. 118-132. Springer, (2010)A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement., , , и . IEEE Trans. Ind. Informatics, 16 (1): 691-702 (2020)Secure and Trusted Application Execution on Embedded Devices., , и . SECITC, том 9522 из Lecture Notes in Computer Science, стр. 3-24. Springer, (2015)Verifying Software Integrity in Embedded Systems: A Side Channel Approach., , , и . COSADE, том 8622 из Lecture Notes in Computer Science, стр. 261-280. Springer, (2014)Smart Cards for Banking and Finance., и . Smart Cards, Tokens, Security and Applications, 2nd Ed., Springer, (2017)Rethinking the Smart Card Technology., и . HCI (24), том 8533 из Lecture Notes in Computer Science, стр. 221-232. Springer, (2014)Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices., , и . ACM Trans. Embed. Comput. Syst., 18 (3): 26:1-26:21 (2019)