Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Regulations and Market Entry., , , and . GAMENETS, volume 75 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 108-123. Springer, (2011)CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap., , and . SysSec@DIMVA, page 75-78. IEEE, (2011)Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks., , and . IEEE Trans. Mob. Comput., 5 (5): 463-476 (2006)Revocation games in ephemeral networks., , , and . ACM Conference on Computer and Communications Security, page 199-210. ACM, (2008)Efficient MAC in cognitive radio systems: A game-theoretic approach., , and . IEEE Trans. Wirel. Commun., 8 (4): 1984-1995 (2009)SOWER: self-organizing wireless network for messaging., , and . WMASH, page 1-10. ACM, (2004)Barter-based cooperation in delay-tolerant personal wireless networks., , , and . WOWMOM, page 1-6. IEEE Computer Society, (2007)Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks., , , and . INFOCOM, page 1442-1450. IEEE, (2007)CryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot., , , , and . SmartGridSec, volume 8448 of Lecture Notes in Computer Science, page 181-192. Springer, (2014)The Long "Taile" of Typosquatting Domain Names., , , , , and . USENIX Security Symposium, page 191-206. USENIX Association, (2014)