Author of the publication

Practical Attacks on HB and HB+ Protocols.

, , , and . WISTP, volume 6633 of Lecture Notes in Computer Science, page 244-253. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fair Mutual Authentication., , and . SECRYPT, page 754-759. SCITEPRESS, (2021)Practical Attacks on HB and HB+ Protocols., , , and . WISTP, volume 6633 of Lecture Notes in Computer Science, page 244-253. Springer, (2011)Efficient Probabilistic Methods for Proof of Possession in Clouds., , and . DMBD, volume 9714 of Lecture Notes in Computer Science, page 364-372. Springer, (2016)Hidden Bits Approach for Authentication in RFID Systems., , , and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 48-58. Springer, (2012)Attacks on CKK Family of RFID Authentication Protocols., , and . ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 241-250. Springer, (2008)RFID System with Allowers., , , and . PerCom Workshops, page 1-6. IEEE Computer Society, (2009)978-1-4244-3304-9.On structural entropy of uniform random intersection graphs., , , and . ISIT, page 1470-1474. IEEE, (2017)Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems., , , and . CyberC, page 89-96. IEEE Computer Society, (2013)