Author of the publication

QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit.

, , , and . NDSS, The Internet Society, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demo: End-to-End Wireless Disruption of CCS EV Charging., , , and . CCS, page 3515-3517. ACM, (2022)Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets., , , and . CODASPY, page 61-72. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments., , , and . SECRYPT, page 135-146. SCITEPRESS, (2023)Seeing Red: PPG Biometrics Using Smartphone Cameras., , , and . CVPR Workshops, page 3565-3574. Computer Vision Foundation / IEEE, (2020)On the Security of the Automatic Dependent Surveillance-Broadcast Protocol, , and . Communications Surveys Tutorials, IEEE, (2014)Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband., , , and . WiSec, page 277-284. ACM, (2019)Peeves: Physical Event Verification in Smart Homes., , and . CCS, page 1455-1467. ACM, (2019)BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior., , , , and . AsiaCCS, page 652-664. ACM, (2020)Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles., , , and . VNC, page 1-8. IEEE, (2018)Attacking Speaker Recognition Systems with Phoneme Morphing., , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 471-492. Springer, (2019)