Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure distance-based RFID identification protocol with an off-line back-end database., , , and . Pers. Ubiquitous Comput., 16 (3): 351-365 (2012)Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery., and . CEC, page 1420-1427. IEEE, (2017)Vulnerability analysis of RFID protocols for tag ownership transfer., , , , and . Comput. Networks, 54 (9): 1502-1508 (2010)Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard., , and . IEICE Trans. Inf. Syst., 93-D (3): 518-527 (2010)No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (11): 2640-2653 (2017)Theia: a tool for the forensic analysis of mobile devices pictures., , , , and . Computing, 98 (12): 1251-1286 (2016)Smartphone image acquisition forensics using sensor fingerprint., , , , , and . IET Comput. Vis., 9 (5): 723-731 (2015)Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts., , , and . Sensors, 18 (9): 2804 (2018)Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns., , , and . Sensors, 18 (10): 3372 (2018)Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications., , , and . ICISSP, page 389-401. SciTePress, (2023)