Author of the publication

Practical Solution to Authentication of Images with a Secure Camera.

, , , , and . Storage and Retrieval for Image and Video Databases (SPIE), volume 3022 of SPIE Proceedings, page 290-297. SPIE, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications., , , , and . CARDIS, (1996)Analytical Characteristics of the DES., , , , , , , , , and . CRYPTO, page 171-202. Plenum Press, New York, (1983)Power and electromagnetic analysis: Improved model, consequences and comparisons., , and . Integration, 40 (1): 52-60 (2007)How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves., , and . Des. Codes Cryptogr., 23 (3): 297-316 (2001)A Flexible Hardware JPEG 2000 Decoder for Digital Cinema., , , , , and . IEEE Trans. Circuits Syst. Video Techn., 16 (11): 1397-1410 (2006)Can GOST Be Made Secure Against Differential Cryptanalysis?, , , , and . Cryptologia, 39 (2): 145-156 (2015)Electromagnetic Attack., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Group Authentication Protocol for Mobile Networks., , and . WiMob, page 28. IEEE Computer Society, (2007)How can we overcome both side channel analysis and fault attacks on RSA-CRT?, and . FDTC, page 21-29. IEEE Computer Society, (2007)Timestamps: Main Issues on Their Use and Implementation., , and . WETICE, page 178-183. IEEE Computer Society, (1999)