Search

Your search keyword '"Bagheri, Nasour"' showing total 290 results

Search Constraints

Start Over You searched for: Author "Bagheri, Nasour" Remove constraint Author: "Bagheri, Nasour"
290 results on '"Bagheri, Nasour"'

Search Results

7. Cryptanalysis of two recently proposed ultralightweight authentication protocol for IoT

10. Deep learning based bio-metric authentication system using a high temporal/frequency resolution transform.

21. Toward designing a lightweight RFID authentication protocol for constrained environments.

22. Differential Fault Attack on SKINNY Block Cipher

24. Security Analysis of Niu et al. Authentication and Ownership Management Protocol

28. The Rise of Passive RFID RTLS Solutions in Industry 5.0.

29. Cryptanalysis of Reduced NORX

30. Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ

35. Differential Fault Analysis of SHA-3

36. Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48

37. Linear Cryptanalysis of Reduced-Round SIMECK Variants

38. Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol.

44. Cryptanalysis of SIMON Variants with Connections

47. On the Security of Tan et al. Serverless RFID Authentication and Search Protocols

48. Another Fallen Hash-Based RFID Authentication Protocol

49. On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol

50. Improved Security Analysis of Fugue-256 (Poster)

Catalog

Books, media, physical & digital resources