Author of the publication

EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations.

, , , , , and . WiMob, page 1-8. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures., , , , and . HOTPOST@MobiHoc, page 31-36. ACM, (2016)Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication., , , , , , , , , and 1 other author(s). CoRR, (2018)Towards traffic-oriented spreading factor allocations in LoRaWAN systems., , , , , , , , and . Med-Hoc-Net, page 1-8. IEEE, (2018)D-STREAMON - NFV-Capable Distributed Framework for Network Monitoring., , , , , , and . SOFT5@ITC, page 30-35. IEEE, (2017)978-0-9883045-3-6.On the feasibility of attribute-based encryption for WLAN access control., , , , and . WiMob, page 1-8. IEEE Computer Society, (2017)EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations., , , , , and . WiMob, page 1-8. IEEE Computer Society, (2017)D-StreaMon: From middlebox to distributed NFV framework for network monitoring., , , , , , and . LANMAN, page 1-2. IEEE, (2017)FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication., , , , and . ARES, page 715-724. IEEE Computer Society, (2016)D-STREAMON - a NFV-capable distributed framework for network monitoring., , , , , , and . CoRR, (2016)Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications., , and . Future Internet, 10 (2): 13 (2018)