Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing TETRA Location Privacy and Network Availability., , , , and . SPSM@CCS, page 117-122. ACM, (2016)mm-Wave on wheels: Practical 60 GHz vehicular communication without beam training., , , , and . COMSNETS, page 1-8. IEEE, (2017)Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises., , and . GHTC, page 62-70. IEEE, (2016)Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace., , and . INFOCOM Workshops, page 1093-1094. IEEE, (2016)Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves., , , , and . CNS, page 335-343. IEEE, (2015)Evaluating dynamic OFDMA subchannel allocation for wireless mesh networks on SDRs., , and . SRIF@SIGCOMM, page 17-24. ACM, (2013)On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market., , , and . Wirtschaftsinformatik, page 1307-1321. University of Siegen, Germany / AISeL, (2019)Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols., , , and . DSN Workshops, page 80-87. IEEE, (2022)Sequential Parametric Optimization for Rate-Splitting Precoding in Non-Orthogonal Unicast and Multicast Transmissions., , , and . ICC, page 3904-3910. IEEE, (2022)Demo: Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices., , , , , , and . EWSN, page 176-177. ACM, (2020)