Author of the publication

SecNav: secure broadcast localization and time synchronization in wireless networks.

, , and . MobiCom, page 310-313. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving User Matching., and . WPES@CCS, page 111-120. ACM, (2015)On Bitcoin Security in the Presence of Broken Cryptographic Primitives., , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 201-222. Springer, (2016)SecNav: secure broadcast localization and time synchronization in wireless networks., , and . MobiCom, page 310-313. ACM, (2007)Attacks on public WLAN-based positioning systems., , , and . MobiSys, page 29-40. ACM, (2009)Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android., , and . NDSS, The Internet Society, (2019)SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network., , and . CODASPY, page 271-282. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Implications of radio fingerprinting on the security of sensor networks., and . SecureComm, page 331-340. IEEE, (2007)Optimal routing with failure-independent path protection., , , , and . Networks, 55 (2): 125-137 (2010)Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications., and . PST, page 1-10. IEEE Computer Society, (2018)Proximity-based access control for implantable medical devices., , , and . ACM Conference on Computer and Communications Security, page 410-419. ACM, (2009)