Author of the publication

ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.

, , , , , , , , and . ESAS, volume 4572 of Lecture Notes in Computer Science, page 187-202. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Client-Server Trade-Offs in Secure Computation., and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)Private Person Authentication in an Ambient World., and . Security, Privacy, and Trust in Modern Data Management, Springer, (2007)RFID-Tags for Anti-counterfeiting., and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 115-131. Springer, (2006)Quantum information theoretical analysis of various constructions for quantum secret sharing., , and . ISIT, page 1598-1602. IEEE, (2005)Hardware Intrinsic Security.. RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 123. Springer, (2010)Practical Biometric Authentication with Template Protection., , , , , and . AVBPA, volume 3546 of Lecture Notes in Computer Science, page 436-446. Springer, (2005)Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method., , , , and . ISIT, page 499-503. IEEE, (2006)Visual Crypto Displays Enabling Secure Communications., , , , and . SPC, volume 2802 of Lecture Notes in Computer Science, page 271-284. Springer, (2003)An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes., , , and . IACR Cryptology ePrint Archive, (2002)Information-theoretic analysis of coating PUFs., , , and . IACR Cryptology ePrint Archive, (2006)