Author of the publication

Secure and Scalable RFID Authentication Protocol.

, , and . DPM/SETOP, volume 6514 of Lecture Notes in Computer Science, page 231-243. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Working at the web search engine side to generate privacy-preserving user profiles., , and . Expert Syst. Appl., (2016)Time-based low emission zones preserving drivers' privacy., , , , and . Future Gener. Comput. Syst., (2018)Secure and privacy-preserving lightweight access control system for low emission zones., , , , and . Comput. Networks, (2018)Distributed system for private web search with untrusted partners., , and . Comput. Networks, (2014)Multi-party Methods for Privacy-Preserving Web Search: Survey and Contributions., , and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)Aggregation of Trustworthy Announcement Messages in Vehicular Ad Hoc Networks., , and . VTC Spring, IEEE, (2009)Blockchain-based access control system for efficient and GDPR-compliant personal data management., , and . Comput. Commun., (January 2024)Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios., , and . Inf. Fusion, 13 (4): 285-295 (2012)Secure and Scalable RFID Authentication Protocol., , and . DPM/SETOP, volume 6514 of Lecture Notes in Computer Science, page 231-243. Springer, (2010)Secure many-to-one symbol transmission for implementation on smart cards., , and . Comput. Networks, 51 (9): 2299-2307 (2007)