Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Way Indexing for Plausible Deniability in Censorship Resistant Storage., , , and . FOCI, USENIX Association, (2012)Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE., , , , , and . USENIX Security Symposium, page 55-72. USENIX Association, (2019)Preventing SIM Box Fraud Using Device Model Fingerprinting., , , , , , and . NDSS, The Internet Society, (2023)GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier., , and . NDSS, The Internet Society, (2018)Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous., , , and . NDSS, The Internet Society, (2012)Security model for a multi-agent marketplace., , and . ICEC, volume 50 of ACM International Conference Proceeding Series, page 119-124. ACM, (2003)Frying PAN: Dissecting Customized Protocol for Personal Area Network., , , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 300-312. Springer, (2015)LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper., , , , , , , and . WISEC, page 43-48. ACM, (2023)Measuring bias in the mixing time of social graphs due to graph sampling., , , , and . MILCOM, page 1-6. IEEE, (2012)Admission Control in Peer Groups., , and . NCA, page 131-139. IEEE Computer Society, (2003)