Author of the publication

A non-key based security scheme supporting emergency treatment of wireless implants.

, , , and . ICC, page 647-652. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying high dimensional data by interactive visual analysis., , , and . J. Vis. Lang. Comput., (2016)Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices., , , , , , and . IEEE J. Biomed. Health Informatics, 23 (4): 1546-1557 (2019)A trust management architecture for hierarchical wireless sensor networks., , , , and . LCN, page 264-267. IEEE Computer Society, (2010)Security services and public key infrastructure for ATM networks., , and . LCN, page 253-262. IEEE Computer Society, (1997)A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks., , , , and . MobiQuitous, volume 73 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 186-197. Springer, (2010)A non-key based security scheme supporting emergency treatment of wireless implants., , , and . ICC, page 647-652. IEEE, (2014)Joint Distributed and Centralized Resource Scheduling for D2D-Based V2X Communication., , , , and . GLOBECOM, page 1-6. IEEE, (2018)Poster: A Neural Network based Cluster Ensemble Approach for Anomaly Detection in DynamicWeighted Graphs., and . EWSN, page 177-178. ACM, (2021)CapsLoc: A Robust Indoor Localization System with WiFi Fingerprinting Using Capsule Networks., , , , , and . ICC, page 1-6. IEEE, (2020)Security Issues in Asynchronous Transfer Mode., , and . ACISP, volume 1270 of Lecture Notes in Computer Science, page 76-89. Springer, (1997)