Author of the publication

Detection of evil flies: securing air-ground aviation communication.

, , , and . MobiCom, page 852-854. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensor Systems Based on FPGAs and Their Applications: A Survey., , and . Sensors, 12 (9): 12235-12264 (2012)PROVE: Provable remote attestation for public verifiability., , , , and . J. Inf. Secur. Appl., (June 2023)A runtime reconfigurable FPGA-based microphone array for sound source localization., , , and . FPL, page 1. IEEE, (2016)Comparing and combining GPU and FPGA accelerators in an image processing context., , , , , and . FPL, page 1-4. IEEE, (2013)Secure FPGA technologies and techniques., , , , , and . FPL, page 560-563. IEEE, (2009)SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks., , , , , and . RNDM, page 1-7. IEEE, (2019)RESERVE: Remote Attestation of Intermittent IoT devices., , , , , and . SenSys, page 578-580. ACM, (2021)Comparison of SRAM and FF PUF in 65nm Technology., , and . NordSec, volume 7161 of Lecture Notes in Computer Science, page 47-64. Springer, (2011)Private Electronic Road Pricing Using Bulletproofs With Vector Commitments., , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 2659-2671 (July 2024)Symmetric-key Based Security for Multicast Communication in Wireless Sensor Networks., , and . Cloudtech, page 1-6. IEEE, (2018)