Author of the publication

Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept.

, , , and . FNSS, volume 670 of Communications in Computer and Information Science, page 126-141. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RFID tags - Grouping proof with forward security., , and . RFID-TA, page 1-6. IEEE, (2013)Energy-Efficient Medium Access Control in Wireless Sensor Networks., and . Guide to Wireless Sensor Networks, Springer, (2009)Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs)., , , and . ACIS-ICIS, page 682-687. IEEE Computer Society, (2007)Offline grouping proof protocol for RFID systems., , and . WiMob, page 247-252. IEEE Computer Society, (2013)An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks., , , , , and . FNSS, volume 1113 of Communications in Computer and Information Science, page 52-64. Springer, (2019)A minimum disclosure approach to authentication and privacy in RFID systems., , , , and . Comput. Networks, 56 (15): 3401-3416 (2012)Special issue on Underwater Acoustic Sensor Networks: Emerging trends and current perspectives., , and . J. Netw. Comput. Appl., (2017)Portguard - an authentication tool for securing ports in an IoT gateway., , , and . PerCom Workshops, page 624-629. IEEE, (2017)Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments., , , and . IEEE Access, (2019)Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs., , , and . CoRR, (2020)