Author of the publication

Weaknesses in Two Recent Lightweight RFID Authentication Protocols.

, , , , and . Inscrypt, volume 6151 of Lecture Notes in Computer Science, page 383-392. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transformation of a general 3D facial model to an actual scene face., , and . ICPR (3), page 75-78. IEEE, (1992)Dating and Authentication of Rembrandt's Etchings with the Help of Computational Intelligence., , and . ICHIM (1), page 485-492. Archives & Museum Informatics, Pittsburgh, PA, USA, (2001)Facial feature localization and adaptation of a generic face model for model-based coding., , , and . Signal Process. Image Commun., 7 (1): 57-74 (1995)Cryptographically secure pseudo-random bit generator for RFID tags., , , and . ICITST, page 1-6. IEEE, (2010)A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties., , and . BalkanCryptSec, volume 9024 of Lecture Notes in Computer Science, page 237-249. Springer, (2014)Robust Labeling Methods for Copy Protection of Images., , and . Storage and Retrieval for Image and Video Databases (SPIE), volume 3022 of SPIE Proceedings, page 298-309. SPIE, (1997)KEYMEX: An expert system for the design of key management schemes., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 96-103. Springer, (1990)Weaknesses in Two Recent Lightweight RFID Authentication Protocols., , , , and . Inscrypt, volume 6151 of Lecture Notes in Computer Science, page 383-392. Springer, (2009)Tracking of global motion and facial expressions of a human face in image sequences., , , and . VCIP, volume 2094 of SPIE Proceedings, SPIE, (1993)Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments., , , , and . SEWCN, volume 42 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 25-35. Springer, (2009)