Author of the publication

Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.

, , , , and . SEWCN, volume 42 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 25-35. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery., and . CEC, page 1420-1427. IEEE, (2017)A secure distance-based RFID identification protocol with an off-line back-end database., , , and . Pers. Ubiquitous Comput., 16 (3): 351-365 (2012)Vulnerability analysis of RFID protocols for tag ownership transfer., , , , and . Comput. Networks, 54 (9): 1502-1508 (2010)No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (11): 2640-2653 (2017)Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns., , , and . Sensors, 18 (10): 3372 (2018)Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts., , , and . Sensors, 18 (9): 2804 (2018)Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard., , and . IEICE Trans. Inf. Syst., 93-D (3): 518-527 (2010)Theia: a tool for the forensic analysis of mobile devices pictures., , , , and . Computing, 98 (12): 1251-1286 (2016)Smartphone image acquisition forensics using sensor fingerprint., , , , , and . IET Comput. Vis., 9 (5): 723-731 (2015)Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications., , , and . ICISSP, page 389-401. SciTePress, (2023)