Author of the publication

Protecting Privacy of BLE Device Users.

, , and . USENIX Security Symposium, page 1205-1221. USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Fault Tolerance Latency from Real-Time Application's Perspectives., and . IEEE Trans. Computers, 49 (1): 55-64 (2000)Joint Spectrum Allocation and Power Control for Multihop Cognitive Radio Networks., , and . IEEE Trans. Mob. Comput., 10 (7): 1042-1055 (2011)Joint Optimal Sensor Selection and Scheduling in Dynamic Spectrum Access Networks., and . IEEE Trans. Mob. Comput., 12 (8): 1532-1545 (2013)Opportunistic Access of TV Spectrum Using Cognitive-Radio-Enabled Cellular Networks., and . IEEE Trans. Vehicular Technology, 60 (8): 3853-3864 (2011)A distributed route-selection scheme for establishing real-time channels., and . HPN, volume 29 of IFIP Conference Proceedings, page 319-330. Chapman & Hall, (1995)LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors., , and . USENIX Security Symposium, page 769-783. USENIX Association, (2015)Building efficient spectrum-agile devices for dummies., , , , and . MobiCom, page 149-160. ACM, (2012)On accurate measurement of link quality in multi-hop wireless mesh networks., and . MobiCom, page 38-49. ACM, (2006)CONNET: Self-Controlled Access Links for Delay and Jitter Requirements., , and . ICNP, page 332-344. IEEE Computer Society, (2005)Deadlock-Free Fault-Tolerant Routing in Injured Hypercubes., and . IEEE Trans. Computers, 42 (9): 1078-1088 (1993)