Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Connectivity and security in a D2D communication protocol for public safety applications., , , and . ISWCS, page 548-552. IEEE, (2014)A privacy enforcing framework for Android applications., , , and . Comput. Secur., (2016)LTE D2D communication for collaborative wearable sensor networks: A connectivity analysis., , and . EuCNC, page 403-407. IEEE, (2016)Zone Keys Trust Management in Vehicular Networks based on Blockchain., , , and . GIoTS, page 1-6. IEEE, (2019)Synchrosqueezing Transform Based Methodology for Radiometric Identification., , and . TSP, page 1-5. IEEE, (2018)Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification., , , and . NTMS, page 1-5. IEEE, (2018)The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices., , , , and . SCVT, page 1-6. IEEE, (2017)SecKit: A Model-based Security Toolkit for the Internet of Things., , , and . Comput. Secur., (2015)A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components., and . IEEE Commun. Surv. Tutorials, 19 (3): 1761-1789 (2017)Imaging time series for internet of things radio frequency fingerprinting., , , and . ICCST, page 1-6. IEEE, (2017)