Author of the publication

PUF-Based RFID Authentication Protocol against Secret Key Leakage.

, , , and . APWeb, volume 7235 of Lecture Notes in Computer Science, page 318-329. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CQArank: jointly model topics and expertise in community question answering., , , , , , and . CIKM, page 99-108. ACM, (2013)PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records., , and . Financial Cryptography Workshops, volume 12063 of Lecture Notes in Computer Science, page 166-176. Springer, (2020)PassApp: My App is My Password!, , , , and . MobileHCI, page 306-315. ACM, (2015)Lightweight RFID Mutual Authentication Protocol against Feasible Problems., , , , and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 69-77. Springer, (2011)ESUM: an efficient UTXO schedule model., , , , and . ICBC, page 1-3. IEEE, (2022)OverlapShard: Overlap-based Sharding Mechanism., , , and . ISCC, page 1-7. IEEE, (2021)An Improved Scheme for Delegation Based on Usage Control., , , , and . FGCN (1), page 74-78. IEEE Computer Society, (2008)Access Control Model Based on Trust and Risk Evaluation in IDMaaS., , , and . ITNG, page 179-184. IEEE Computer Society, (2015)HoneyHash: Honeyword Generation Based on Transformed Hashes., and . NordSec, volume 12556 of Lecture Notes in Computer Science, page 161-173. Springer, (2020)A Game Theoretic Approach Based Access Control Mechanism., , , , and . ICYCS, page 1464-1469. IEEE Computer Society, (2008)