Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of the Wireless Electric Vehicle Charging Communication., , , and . SmartGridComm, page 393-398. IEEE, (2022)They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors., , , , and . ACSAC, page 399-413. ACM, (2021)BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments., , , and . SECRYPT, page 135-146. SCITEPRESS, (2023)Peeves: Physical Event Verification in Smart Homes., , and . CCS, page 1455-1467. ACM, (2019)RingAuth: Wearable Authentication using a Smart Ring., , , and . CoRR, (2023)Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting., , , , and . CCS, page 608-621. ACM, (2023)Biometric Identification System based on Object Interactions in Internet of Things Environments., , , and . SP (Workshops), page 215-221. IEEE, (2022)POSTER: spaceQUIC: Securing Communication in Computationally Constrained Spacecraft., , , , and . CoRR, (2023)To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection., , , and . CSR, page 8-15. IEEE, (2023)Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks., , , , , , and . WISEC, page 341-352. ACM, (2023)