From post

Wireless Authentication and Transaction-Confirmation Token.

, , , и . ICETE (Selected Papers), том 130 из Communications in Computer and Information Science, стр. 186-198. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Insights into the mind of a trojan designer: the challenge to integrate a trojan into the bitstream., , , , , и . ASP-DAC, стр. 112-119. ACM, (2019)Reverse Engineering x86 Processor Microcode., , , , , , и . CoRR, (2019)A critical view on the real-world security of logic locking., , и . J. Cryptogr. Eng., 12 (3): 229-244 (2022)Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?, , , , , , и . CoRR, (2021)Expanding Explainability: From Explainable Artificial Intelligence to Explainable Hardware., , , , , и . CoRR, (2023)IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing., , , , , , , и . SP, стр. 1705-1721. IEEE, (2022)Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations., , , , , и . SP, стр. 56-74. IEEE, (2023)Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging., , , , и . WISEC, стр. 60-72. ACM, (2022)Digital Rights Management Systeme (DRMS) als Enabling Technology im Automobil., , и . Sicherheit, том P-62 из LNI, стр. 193-196. GI, (2005)Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces., , , , и . AsiaCCS, стр. 208-221. ACM, (2022)