From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol., , , и . IACR Cryptology ePrint Archive, (2011)On the Traceability of Tags in SUAP RFID Authentication Protocols., , и . IACR Cryptology ePrint Archive, (2012)Cryptanalysis of RAPP, an RFID Authentication Protocol., , , и . IACR Cryptology ePrint Archive, (2012)Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6"., , , и . IEEE Communications Letters, 17 (4): 805-807 (2013)ECCPWS: An ECC-based protocol for WBAN systems., , и . Comput. Networks, (апреля 2023)On the Security of Tan et al. Serverless RFID Authentication and Search Protocols., , , , и . RFIDSec, том 7739 из Lecture Notes in Computer Science, стр. 1-19. Springer, (2012)Questioning the Security of Three Recent Authentication and Key Agreement Protocols., , , , , , , и . IEEE Access, (2021)A New Secure Authentication Protocol for Telecare Medicine Information System and Smart Campus., и . IEEE Access, (2019)ECGsound for human identification., , , и . Biomed. Signal Process. Control., 72 (Part): 103335 (2022)A new method for privacy preserving association rule mining using homomorphic encryption with a secure communication protocol., , и . Wirel. Networks, 29 (3): 1197-1212 (апреля 2023)