Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication Mechanisms in the 5G System., , and . J. ICT Stand., 9 (2): 61-78 (2021)Misbehaviour Reporting in ETSI ITS Standard Considered Broken., and . CSCN, page 144-150. IEEE, (2022)Overview of 5G URLLC System and Security Aspects in 3GPP., , and . CSCN, page 1-5. IEEE, (2019)A Survey of Security and Privacy Issues in V2X Communication Systems., , , , , , and . CoRR, (2022)Open Questions in VRU Standards from Security and Privacy Perspectives., and . CSCN, page 284-289. IEEE, (2023)Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments., , , , and . Future Internet, 16 (3): 77 (March 2024)Survey of Security Aspect of V2X Standards and Related Issues., and . CSCN, page 1-5. IEEE, (2019)Post-Quantum Impacts on V2X Certificates - Already at The End of The Road., and . VTC2023-Spring, page 1-6. IEEE, (2023)A New Privacy Enhancing Beacon Scheme in V2X Communication., , and . DPM/CBT@ESORICS, volume 13140 of Lecture Notes in Computer Science, page 139-151. Springer, (2021)A Survey of Security and Privacy Issues in V2X Communication Systems., , , , , , and . ACM Comput. Surv., 55 (9): 185:1-185:36 (2023)