Digital Library
Search Results: [ keyword: Attacks ] (30)
Azeem Irshad,
Muhammad Sher,
Hafiz Farooq Ahmad,
Bander A. Alzahrani,
Shehzad Ashraf Chaudhry,
Rahul Kumar,
Vol. 10, No. 12, December 30, 2016
10.3837/tiis.2016.12.021
10.3837/tiis.2016.12.021
Saru Kumari,
Xiong Li,
Fan Wu,
Ashok Kumar Das,
Vanga Odelu,
Muhammad Khurram Khan,
Vol. 10, No. 9, September 29, 2016
10.3837/tiis.2016.09.026
10.3837/tiis.2016.09.026
Jeevaa Katiravan,
Duraipandian N,
Dharini N,
Vol. 9, No. 11, November 29, 2015
10.3837/tiis.2015.11.022
10.3837/tiis.2015.11.022
S. Fouzul Hidhaya,
Angelina Geetha,
B. Nandha Kumar,
Loganathan Venkat Sravanth,
A. Habeeb,
Vol. 9, No. 10, October 30, 2015
10.3837/tiis.2015.10.024
10.3837/tiis.2015.10.024
Muhammad Daniel Hafiz Abdullah,
Zurina Mohd Hanapi,
Zuriati Ahmad Zukarnain,
Mohamad Afendee Mohamed,
Vol. 9, No. 4, April 29, 2015
10.3837/tiis.2015.04.013
10.3837/tiis.2015.04.013
Ahmad Karim,
Syed Adeel Ali Shah,
Rosli Bin Salleh,
Muhammad Arif,
Rafidah Md Noor,
Shahaboddin Shamshirband,
Vol. 9, No. 4, April 29, 2015
10.3837/tiis.2015.04.012
10.3837/tiis.2015.04.012
29.
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environment
Abedelaziz Mohaisen,
Ku-Young Chang,
Dowon Hong,
Vol. 5, No. 9, September 28, 2011
10.3837/tiis.2011.09.011
10.3837/tiis.2011.09.011
Jeong Ok Kwon,
Ik Rae Jeong,
Dong Hoon Lee,
Vol. 2, No. 6, December 24, 2008
10.3837/tiis.2008.06.003
10.3837/tiis.2008.06.003