Author of the publication

Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols.

, and . SEC, volume 232 of IFIP, page 109-120. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PreCrime to the rescue: defeating mobile malware one-step ahead., , , , , and . APSys, page 5:1-5:7. ACM, (2014)RFID privacy: relation between two notions, minimal condition, and efficient construction., , , and . ACM Conference on Computer and Communications Security, page 54-65. ACM, (2009)Secure and Practical Key Distribution for RFID-Enabled Supply Chains., , and . SecureComm, volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 356-372. Springer, (2011)Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols., and . SEC, volume 232 of IFIP, page 109-120. Springer, (2007)Resilient Aggregation Scheme for Confidential Sensor Reports., and . ICC, page 1472-1477. IEEE, (2007)Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks., , and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 200-209. Springer, (2005)Authenticated CAN Communications Using Standardized Cryptographic Techniques., , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 330-343. (2016)Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains., , , , and . ICISS, volume 6503 of Lecture Notes in Computer Science, page 246-260. Springer, (2010)Adaptive Stream Authentication for Wireless Multimedia Communications., and . WCNC, page 2613-2618. IEEE, (2007)On the Trust and Trust Modeling for the Future Fully-Connected Digital World: A Comprehensive Study., , , , and . IEEE Access, (2021)