Author of the publication

How to protect security and privacy in the IoT: a policy-based RFID tag management protocol.

, , and . Secur. Commun. Networks, 7 (12): 2669-2683 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PriS Methodology: Incorporating Privacy Requirements into the System Design Process, , and . 5th IEEE International Symposium on Signal Processing and Information Technology, page 18--21. (2005)An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder., , and . Communications and Multimedia Security, volume 175 of IFIP, page 209-221. Springer, (2004)Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes., , , , and . Future Internet, 11 (11): 234 (2019)On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem., and . Int. J. Inf. Sec., 12 (2): 151-154 (2013)Specifying and implementing privacy-preserving cryptographic protocols., , and . Int. J. Inf. Sec., 7 (6): 395-420 (2008)New facets of mobile botnet: architecture and evaluation., , and . Int. J. Inf. Sec., 15 (5): 455-473 (2016)A framework for designing cloud forensic-enabled services (CFeS)., , , and . Requir. Eng., 24 (3): 403-430 (2019)Addressing privacy requirements in system design: the PriS method., , and . Requir. Eng., 13 (3): 241-255 (2008)Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification., , and . Comput. Commun., 22 (8): 697-709 (1999)Towards a framework for evaluating certificate status information mechanisms., , , , , and . Comput. Commun., 26 (16): 1839-1850 (2003)