Author of the publication

Detecting rogue devices in bluetooth networks using radio frequency fingerprinting.

, , and . Communications and Computer Networks, page 108-113. IASTED/ACTA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault-Tolerant Broadcasting in Radio Networks., , and . J. Algorithms, 39 (1): 47-67 (2001)Strategies for Hotlink Assignments., , , , , , and . ISAAC, volume 1969 of Lecture Notes in Computer Science, page 23-34. Springer, (2000)When Patrolmen Become Corrupted: Monitoring a Graph Using Faulty Mobile Robots., , , , , and . ISAAC, volume 9472 of Lecture Notes in Computer Science, page 343-354. Springer, (2015)Local Maximal Matching and Local 2-Approximation for Vertex Cover in UDGs., and . ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 1-14. Springer, (2008)Approximate Hotlink Assignment., , and . ISAAC, volume 2223 of Lecture Notes in Computer Science, page 756-767. Springer, (2001)Optimal Memory Rendezvous of Anonymous Mobile Agents in a Unidirectional Ring., , , and . SOFSEM, volume 3831 of Lecture Notes in Computer Science, page 282-292. Springer, (2006)Mobile Agent Rendezvous: A Survey., , and . SIROCCO, volume 4056 of Lecture Notes in Computer Science, page 1-9. Springer, (2006)The Beachcombers' Problem: Walking and Searching with Mobile Robots., , , , and . SIROCCO, volume 8576 of Lecture Notes in Computer Science, page 23-36. Springer, (2014)Weighted Distributed Match-Making., and . AWOC, volume 319 of Lecture Notes in Computer Science, page 361-368. Springer, (1988)Mobile Agent Rendezvous in a Synchronous Torus., , and . LATIN, volume 3887 of Lecture Notes in Computer Science, page 653-664. Springer, (2006)