Author of the publication

A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets.

, and . TrustCom, page 206-213. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access Control Synthesis for Physical Spaces., , and . CoRR, (2016)Partial Order Reduction for Branching Security Protocols., , and . ACSD, page 191-200. IEEE Computer Society, (2010)A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets., and . TrustCom, page 206-213. IEEE Computer Society, (2011)Derailing Attacks (Transcript of Discussion).. Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 47-49. Springer, (2015)Constructing Mid-Points for Two-Party Asynchronous Protocols., , and . OPODIS, volume 7109 of Lecture Notes in Computer Science, page 481-496. Springer, (2011)Model-Based Detection of CSRF., , and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 30-43. Springer, (2014)SECFUZZ: Fuzz-testing security protocols., , and . AST, page 1-7. IEEE Computer Society, (2012)VERA: A Flexible Model-Based Vulnerability Testing Tool., , , , and . ICST, page 471-478. IEEE Computer Society, (2013)Scalable, privacy preserving radio-frequency identification protocol for the internet of things., and . Concurrency and Computation: Practice and Experience, 27 (8): 1932-1950 (2015)The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures., , , , , , , , , and 12 other author(s). TACAS, volume 7214 of Lecture Notes in Computer Science, page 267-282. Springer, (2012)