From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Resisting against aggregator compromises in sensor networks., , , и . CoNEXT, стр. 24. ACM, (2006)Securing wireless sensor networks against aggregator compromises., , , и . IEEE Communications Magazine, 46 (4): 134-141 (2008)WiPal: Efficient Offline Merging of IEEE 802.11 Traces, и . CoRR, (2008)Inside Vaucanson., , , , и . CIAA, том 3845 из Lecture Notes in Computer Science, стр. 116-128. Springer, (2005)Securing OLSR Routes., , и . AINTEC, том 3837 из Lecture Notes in Computer Science, стр. 183-194. Springer, (2005)Manipulating Wi-Fi packet traces with WiPal: design and experience., и . Softw. Pract. Exp., 42 (5): 585-599 (2012)Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks, , , и . CoRR, (2006)WiPal: efficient offline merging of IEEE 802.11 traces., и . ACM SIGMOBILE Mob. Comput. Commun. Rev., 13 (4): 39-46 (2009)WiPal and WScout, two hands-on tools for wireless packet traces manipulation and visualization., и . WINTECH, стр. 103-104. ACM, (2008)An Empirical Analysis of Wi-Fi Activity in Three Urban Scenarios., , и . PerCom Workshops, стр. 1-6. IEEE Computer Society, (2009)978-1-4244-3304-9.