Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures., , , , and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 266-281. Springer, (2004)On Misconception of Hardware and Cost in IoT Security and Privacy., , , , , , and . ICC, page 1-7. IEEE, (2019)INCOR: Inter-flow Network Coding based Opportunistic Routing in wireless mesh networks., , , , and . ICC, page 3666-3671. IEEE, (2015)A New Replay Attack Against Anonymous Communication Networks., , , and . ICC, page 1578-1582. IEEE, (2008)Microcontroller Based IoT System Firmware Security: Case Studies., , , , and . ICII, page 200-209. IEEE, (2019)Towards Incentive Mechanism for Taxi Services Allocation with Privacy Guarantee., , , , and . IPCCC, page 1-8. IEEE, (2018)On simulation studies of cyber attacks against LTE networks., , , , , and . ICCCN, page 1-8. IEEE, (2014)Optimizing Aggregate Query Processing in Cloud Data Warehouses., , , , , and . Globe, volume 8648 of Lecture Notes in Computer Science, page 1-12. Springer, (2014)HAWK: An unmanned mini helicopter-based aerial wireless kit for localization., , , , and . INFOCOM, page 2219-2227. IEEE, (2012)Identifying mobiles hiding behind wireless routers., , , , and . INFOCOM, page 2651-2659. IEEE, (2011)