Author of the publication

Scalable RFID security protocols supporting tag ownership transfer.

, and . Computer Communications, 34 (4): 556-566 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic content attacks on digital signatures., and . Inf. Manag. Comput. Security, 13 (4): 328-336 (2005)Partial Key Recovery Attack Against RMAC., and . J. Cryptology, 18 (4): 375-389 (2005)Scalable RFID security protocols supporting tag ownership transfer., and . Computer Communications, 34 (4): 556-566 (2011)De Bruijn Sequences and Perfect Factors.. SIAM J. Discrete Math., 10 (2): 270-281 (1997)Ubiquitous One-Time Password Service Using the Generic Authentication Architecture., , and . MONET, 18 (5): 738-747 (2013)Comments on mutual authentication and key exchange protocols for low power wireless communications., and . IEEE Communications Letters, 8 (4): 262-263 (2004)Spy Agents: Evaluating Trust in Remote Environments., , and . Security and Management, page 405-411. CSREA Press, (2005)Addressing privacy issues in CardSpace., and . IAS, page 285-291. IEEE Computer Society, (2007)On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes.. IEEE Trans. Information Theory, 44 (7): 3146-3150 (1998)Aperiodic and semi-periodic perfect maps.. IEEE Trans. Information Theory, 41 (1): 88-95 (1995)