Author of the publication

BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.

, , , , , and . WISEC, page 133-144. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering., , , , and . M&N, page 1-6. IEEE, (2022)Adaptive Coordinated Random Access For MTC With Correlated Traffic and Data Freshness., , and . SPAWC, page 206-210. IEEE, (2021)ADASS: Anti-Drone Audio Surveillance Sentinel via Embedded Machine Learning., , , and . SAS, page 1-6. IEEE, (2023)Knocking on Tangle's Doors: Security Analysis of IOTA Ports., , , , and . Blockchain, page 433-439. IEEE, (2021)DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles., , and . WISEC, page 174-184. ACM, (2024)Interference Prediction for Low-Complexity Link Adaptation in Beyond 5G Ultra-Reliable Low-Latency Communications., , , , and . CoRR, (2021)EVScout2.0: Electric Vehicle Profiling Through Charging Profile., , , and . CoRR, (2021)Towards An Enhanced Reputation System for IOTA's Coordicide., , , and . BCCA, page 26-33. IEEE, (2021)Beamforming and Scheduling for mmWave Downlink Sparse Virtual Channels with Non-Orthogonal and Orthogonal Multiple Access., and . VTC Fall, page 1-6. IEEE, (2017)Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions., , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 67-80. Springer, (2022)