Author of the publication

Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.

, , , and . Eng. Appl. Artif. Intell., 24 (6): 1061-1069 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study on the false positive rate of Stegdetect., , and . Digit. Investig., 9 (3-4): 235-245 (2013)Investigating the impact of ransomware splash screens., , , and . J. Inf. Secur. Appl., (2021)A new approach to analyze the independence of statistical tests of randomness., , , and . Appl. Math. Comput., (2022)PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone., , , and . IEEE Access, (2021)Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA., and . IEEE Congress on Evolutionary Computation, page 2189-2193. IEEE, (2003)A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques., , , and . Future Gener. Comput. Syst., (2017)Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains., , , , and . CoRR, (2020)Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains., , , , and . J. Netw. Comput. Appl., (2021)Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2)., , , , and . Entropy, 24 (5): 613 (2022)On the Effectiveness of Ransomware Decryption Tools., , , and . Comput. Secur., (2021)