Author of the publication

Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications.

, , and . Future Internet, 10 (2): 13 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Information Centric Networking to NoSQL databases: The spatio-temporal use case., , , , , , and . LANMAN, page 1-6. IEEE, (2017)Communications through Virtual Technologies., , , , and . NETWORKING Tutorials, volume 2497 of Lecture Notes in Computer Science, page 124-154. Springer, (2002)The Bluetooth Technology: State of the Art and Networking Aspects., , , , and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 479-490. Springer, (2002)WiMAX fractional frequency reuse for rural environments., , and . IEEE Wirel. Commun., 15 (3): 60-65 (2008)eBPF Programming Made Easy with eCLAT., , , , , and . CNSM, page 28-36. IEEE, (2022)Performance Assessment of an Epidemic Protocol in VANET Using Real Traces., , , , , and . MoWNet, volume 40 of Procedia Computer Science, page 92-99. Elsevier, (2014)In Plain Sight: A Pragmatic Exploration of the Medical Landscape (In)security., , , and . ITASEC, volume 3731 of CEUR Workshop Proceedings, CEUR-WS.org, (2024)Planning of multi-carrier broadband wireless systems with ideal power control over frequency selective channels., , and . PIMRC, page 1-5. IEEE, (2008)Towards a Hybrid UHF RFID and NFC Platform for the Security of Medical Data from a Point of Care., , , , , , , , , and 1 other author(s). RFID-TA, page 142-145. IEEE, (2022)Implementation of Accurate Per-Flow Packet Loss Monitoring in Segment Routing over IPv6 Networks., , , , , and . HPSR, page 1-8. IEEE, (2020)