Author of the publication

Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications.

, , and . Future Internet, 10 (2): 13 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The One-Out-of-k Retrieval Problem and Linear Network Coding., , , , and . ICMCTA, volume 3 of CIM Series in Mathematical Sciences, page 61-75. Springer, (2014)Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications., , and . Future Internet, 10 (2): 13 (2018)The case for native multi-node in-network machine learning., , , , , and . NativeNI@CoNEXT, page 8-13. ACM, (2022)OpenSatRange: An open cyber range for operators and users of satellite communication networks., , , , , , , , , and 1 other author(s). ITASEC, volume 3731 of CEUR Workshop Proceedings, CEUR-WS.org, (2024)Towards a Hybrid UHF RFID and NFC Platform for the Security of Medical Data from a Point of Care., , , , , , , , , and 1 other author(s). RFID-TA, page 142-145. IEEE, (2022)Delay performance of a Publish Subscribe system deployed over a memory-constrained, Delay Tolerant Network., , , , , , and . Med-Hoc-Net, page 25-32. IEEE, (2011)The Design of an Energy Harvesting Wireless Sensor Node for Tracking Pink Iguanas., , , , , and . Sensors, 19 (5): 985 (2019)ABEBox: A data driven access control for securing public cloud storage with efficient key revocation., , , and . ARES, page 129:1-129:7. ACM, (2021)Simulation of peer-to-peer streaming over large-scale networks using OPSS., , , and . VALUETOOLS, page 17. ICST/ACM, (2007)A Theory-Driven Distribution Algorithm for Peer-to-Peer Real Time Streaming., , , , , and . GLOBECOM, page 2291-2296. IEEE, (2008)