Author of the publication

A Comparative Literature Review on RFID Security and Privacy.

, , , and . iiWAS, volume 229 of books@ocg.at, page 213-222. Austrian Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CASSIS - Computer-based Academy for Security and Safety in Information Systems., , , , , and . ARES, page 730-740. IEEE Computer Society, (2007)A Comparative Literature Review on RFID Security and Privacy., , , and . iiWAS, volume 229 of books@ocg.at, page 213-222. Austrian Computer Society, (2007)Pseudonymization for improving the Privacy in E-Health Applications., , , and . HICSS, page 255. IEEE Computer Society, (2008)Projection Displays Induce Less Simulator Sickness than Head-Mounted Displays in a Real Vehicle Driving Simulator, , and . Proceedings of the International Conference on Automotive User Interfaces and Interactive Vehicular Applications (AutomotiveUI), page 379-387. ACM, (2019)Secure Access to Emergency Data in an e-Health Architecture., and . iiWAS, volume 229 of books@ocg.at, page 297-306. Austrian Computer Society, (2007)Economic and Security Aspects of Applying a Threshold Scheme in e-Health., , , and . ARES, page 39-46. IEEE Computer Society, (2008)A secure architecture for the pseudonymization of medical data., , , , , and . ARES, page 318-324. IEEE Computer Society, (2007)A Secure e-Health Architecture based on the Appliance of Pseudonymization., , and . JSW, 3 (2): 23-32 (2008)A research agenda for Autonomous Business Process Management., , and . ARES, page 670-680. IEEE Computer Society, (2007)Applying a Threshold Scheme to the Pseudonymization of Health Data., , and . PRDC, page 397-400. IEEE Computer Society, (2007)