Author of the publication

The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks.

, and . ICDCS Workshops, page 916-922. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Seys, Stefaan
add a person with the name Seys, Stefaan
 

Other publications of authors with the same name

The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks., and . ICDCS Workshops, page 916-922. IEEE Computer Society, (2005)Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks., and . SPC, volume 3450 of Lecture Notes in Computer Science, page 86-100. Springer, (2005)Power consumption evaluation of efficient digital signature schemes for low power devices., and . WiMob (1), page 79-86. IEEE, (2005)Privacy-Preserving ECC-Based Grouping Proofs for RFID., , , , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 159-165. Springer, (2010)ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks., and . AINA (2), page 133-137. IEEE Computer Society, (2006)Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs., , , , and . Personal and Ubiquitous Computing, 16 (3): 323-335 (2012)User Privacy in RFID Networks., and . ISSE, page 206-215. Vieweg+Teubner, (2009)The security of mass transport ticketing systems., , and . ISSE, page 347-356. Vieweg+Teubner, (2008)inShopnito: An Advanced yet Privacy-Friendly Mobile Shopping Application., , , , , , , , , and . SERVICES, page 129-136. IEEE Computer Society, (2014)Secure JTAG Implementation Using Schnorr Protocol., , , , , , , , and . J. Electronic Testing, 29 (2): 193-209 (2013)