Author of the publication

PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles.

, , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1541-1558 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection at the Network Edge: Solutions, Limitations, and Future Directions., , and . EDGE, volume 11520 of Lecture Notes in Computer Science, page 59-75. Springer, (2019)eRIPP-FS: Enforcing privacy and security in RFID., , , and . Secur. Commun. Networks, 3 (1): 58-70 (2010)Addressing the shortcomings of one-way chains., , , and . AsiaCCS, page 289-296. ACM, (2006)RFID security and privacy: long-term research or short-term tinkering?, , , , , , and . WISEC, page 160. ACM, (2008)Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions., and . CoRR, (2022)Receivers location privacy in avionic crowdsourced networks: Issues and countermeasures., , and . J. Netw. Comput. Appl., (2021)LLD: A Low Latency Detection Solution to Thwart Cryptocurrency Pump & Dumps., , and . ICBC, page 1-9. IEEE, (2023)New Dimensions of Information Warfare: The Economic Pillar - Fintech and Cryptocurrencies., , , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 3-27. Springer, (2020)Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations., , and . CNS, page 109-117. IEEE, (2022)Detecting Drones Status via Encrypted Traffic Analysis., , , and . WiseML@WiSec, page 67-72. ACM, (2019)