Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Your 80211 wireless network has no clothes., , , and . IEEE Wirel. Commun., 9 (6): 44-51 (2002)Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks., , , and . ICOIN, volume 5200 of Lecture Notes in Computer Science, page 649-658. Springer, (2007)Secure quality of service handling: SQoSH., , , , and . IEEE Commun. Mag., 38 (4): 106-112 (2000)Automated Recovery in a Secure Bootstrap Process., , , and . NDSS, The Internet Society, (1998)High-Performance MAC for High-Capacity Wireless LANs., , , and . ICCCN, page 167-172. IEEE, (2004)The Dangers of Mitigating Security Design Flaws: A Wireless Case Study., and . IEEE Secur. Priv., 1 (1): 28-36 (2003)Wireless Security Is Different.. Computer, 36 (8): 99-101 (2003)Personal Secure Booting., , , and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 130-144. Springer, (2001)VICI Virtual Machine Introspection for Cognitive Immunity., , and . ACSAC, page 87-96. IEEE Computer Society, (2008)Living with Insecurity., and . IEEE Secur. Priv., 9 (6): 12-13 (2011)