Author of the publication

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems.

, , , and . SPC, volume 2802 of Lecture Notes in Computer Science, page 201-212. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RFID Privacy Workshop: Concerns, Consensus, and Questions.. IEEE Security & Privacy, 2 (2): 48-50 (2004)Defining Strong Privacy for RFID., and . IACR Cryptology ePrint Archive, (2006)Authenticating Pervasive Devices with Human Protocols., and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 293-308. Springer, (2005)Practical Order-Revealing Encryption with Limited Leakage., , , and . FSE, volume 9783 of Lecture Notes in Computer Science, page 474-493. Springer, (2016)Honest-Verifier Private Disjointness Testing Without Random Oracles., and . Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, page 277-294. Springer, (2006)Security Parallels between People and Pervasive Devices.. PerCom Workshops, page 105-109. IEEE Computer Society, (2005)Defining Strong Privacy for RFID., and . PerCom Workshops, page 342-347. IEEE Computer Society, (2007)Scaling Backend Authentication at Facebook., , , , , and . IACR Cryptology ePrint Archive, (2018)Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems., , , and . SPC, volume 2802 of Lecture Notes in Computer Science, page 201-212. Springer, (2003)Privacy Enhancing Technologies.. IEEE Security & Privacy, 4 (5): 59-59 (2006)