Author of the publication

Recognition in a Low-Power Environment

, , , and . Workshop on Wireless Ad Hoc Networking, held in conjunction with IEEE International Conference on Distributed Computing Systems, Columbus, Ohio, USA, WWAN2005, ICDCS2005, (June 2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets., and . CECC, page 16:1-16:6. ACM, (2019)WSNs on the Road for Automobiles, , , and . Presentation, (March 2005)13th Wireless World Reseach Forum, Jeju Island, Korea.CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks, , and . IEEE International Conference on Communications, Seoul, Korea, ICC2005, (May 2005)Secure Comparison of Encrypted Data in Wireless Sensor Networks, , and . 3rd Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Trentino, Italy, WiOpt2005, (April 2005)Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks, , and . IEEE International Conference on Communications, Istanbul, Turkey, ICC2006, (June 2006)A Survey on the Encryption of Convergecast-Traffic with In-Network Processing, , and . IEEE Transactions on Dependable and Secure Computing, (2008)to appear.Security Solutions for Wireless Sensor Networks, , and . NEC Journal of Advanced Technology, (June 2006)Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution and Routing Adaptation, , and . IEEE Transactions on Mobile Computing, (2006)A ROM-friendly Secure Code Update mechanism for WSNs using a stateful-verifier T-time Signature Scheme, , and . ACM Conference on Wireless Security, WiSec'09, ACM, (2009)to appear.Protecting a Mobile Agent's Route against Collusions., , , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 215-225. Springer, (1999)