Author of the publication

Trust on Web Browser: Attack vs. Defense.

, and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 241-253. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols., , and . JSW, 3 (3): 1-10 (2008)Building trusted path on untrusted device drivers for mobile devices., , , , , , and . APSys, page 8:1-8:7. ACM, (2014)Time cost evaluation for executing RFID authentication protocols., , , , and . IOT, IEEE, (2010)Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream., , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 389-401. Springer, (2005)Trust on Web Browser: Attack vs. Defense., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 241-253. Springer, (2003)Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems., , , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 372-383. Springer, (2009)Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework., , and . EUC (2), page 159-166. IEEE Computer Society, (2008)978-0-7695-3492-3.Secure RFID Identification and Authentication with Triggered Hash Chain Variants., , and . ICPADS, page 583-590. IEEE Computer Society, (2008)Provably secure anonymous identification protocols for ad-hoc access structures., and . PIMRC, page 2696-2700. IEEE, (2005)Highly reliable trust establishment scheme in ad hoc networks., , , , , and . Computer Networks, 45 (6): 687-699 (2004)