Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply., , , and . Wireless Networks, 15 (1): 39-51 (2009)Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment., , and . WISA, volume 10144 of Lecture Notes in Computer Science, page 1-14. (2016)Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems: poster., , , and . MobiCom, page 473-474. ACM, (2016)Fast and scalable secret key generation exploiting channel phase randomness in wireless networks., , , and . INFOCOM, page 1422-1430. IEEE, (2011)Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data., , , , and . IEEE Trans. Image Processing, 25 (7): 3411-3425 (2016)A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks., , and . WISEC, page 62-67. ACM, (2008)zk-AuthFeed: How to Feed Authenticated Data into Smart Contract with Zero Knowledge., , , and . Blockchain, page 83-90. IEEE, (2019)Persistent Fault Attack in Practice., , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (2): 172-195 (2020)Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance., , , , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 480-496. Springer, (2019)Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation., , , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (4): 745-759 (2020)