Author of the publication

Threats to Security in DSRC/WAVE.

, and . ADHOC-NOW, volume 4104 of Lecture Notes in Computer Science, page 266-279. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threats to Security in DSRC/WAVE., and . ADHOC-NOW, volume 4104 of Lecture Notes in Computer Science, page 266-279. Springer, (2006)Solution to the wireless evil-twin transmitter attack., , and . CRiSIS, page 1-7. IEEE Computer Society, (2010)Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks., and . EURASIP J. Wireless Comm. and Networking, (2009)Centroid Localization of Uncooperative Nodes in Wireless Networks Using a Relative Span Weighting Method., and . EURASIP J. Wireless Comm. and Networking, (2010)Secure Anonymous Broadcasting in Vehicular Networks., and . LCN, page 661-668. IEEE Computer Society, (2007)Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks., and . WASA, volume 5682 of Lecture Notes in Computer Science, page 358-367. Springer, (2009)Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks., and . LCN, page 600-607. IEEE Computer Society, (2008)