Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zero reconciliation secret key generation for body-worn health monitoring devices., , and . WISEC, page 39-50. ACM, (2012)Authentication of lossy data in body-sensor networks for healthcare monitoring., , and . SECON, page 470-478. IEEE, (2012)Packet Pacing in Short Buffer Optical Packet Switched Networks., , , and . INFOCOM, IEEE, (2006)A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks., , , and . WISEC, page 245-252. ACM, (2009)An experimental study of secret key generation for passive Wi-Fi wearable devices., , and . WoWMoM, page 1-9. IEEE, (2017)Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps., , , , , , and . ICSE, page 1671-1682. IEEE, (2021)Finding Flaws from Password Authentication Code in Android Apps., , , , , , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 619-637. Springer, (2019)Decorrelating secret bit extraction via channel hopping in body area networks., , , and . PIMRC, page 1454-1459. IEEE, (2012)A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems., , and . CANS, volume 11261 of Lecture Notes in Computer Science, page 436-455. Springer, (2017)Analysis of an omni-directional narrowband ultrasonic receiver and CSS-based broadband transmission., , and . SenSys, page 361-362. ACM, (2009)