Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks., , and . DCOSS, volume 4026 of Lecture Notes in Computer Science, page 338-355. Springer, (2006)Evidence Collection in Peer-to-Peer Network Investigations., and . IFIP Int. Conf. Digital Forensics, volume 383 of IFIP Advances in Information and Communication Technology, page 215-230. Springer, (2012)A dynamic en-route scheme for filtering false data injection in wireless sensor networks., and . SenSys, page 294-295. ACM, (2005)Approximate membership query over time-decaying windows for event stream processing., , and . DEBS, page 44-47. ACM, (2012)The Wireless Applied Research on Concatenated Code for SpaceWire Communication Network., , , and . CSEE (3), volume 216 of Communications in Computer and Information Science, page 214-220. Springer, (2011)Cardinality change-based early detection of large-scale cyber-attacks., , and . INFOCOM, page 1788-1796. IEEE, (2013)Lightweight Mutual Authentication and Ownership Transfer for RFID Systems., , , and . INFOCOM, page 251-255. IEEE, (2010)A fast sketch for aggregate queries over high-speed network traffic., , and . INFOCOM, page 2741-2745. IEEE, (2012)Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness., , , , , , and . SADFE, page 1-3. IEEE Computer Society, (2011)A lightweight authentication protocol for access control in IEEE 802.11., , and . GLOBECOM, page 1384-1388. IEEE, (2003)