Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Way Indexing for Plausible Deniability in Censorship Resistant Storage., , , and . FOCI, USENIX Association, (2012)Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE., , , , , and . USENIX Security Symposium, page 55-72. USENIX Association, (2019)Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous., , , and . NDSS, The Internet Society, (2012)Preventing SIM Box Fraud Using Device Model Fingerprinting., , , , , , and . NDSS, The Internet Society, (2023)GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier., , and . NDSS, The Internet Society, (2018)Security model for a multi-agent marketplace., , and . ICEC, volume 50 of ACM International Conference Proceeding Series, page 119-124. ACM, (2003)Frying PAN: Dissecting Customized Protocol for Personal Area Network., , , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 300-312. Springer, (2015)LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper., , , , , , , and . WISEC, page 43-48. ACM, (2023)Dynamix: anonymity on dynamic social structures., and . AsiaCCS, page 167-172. ACM, (2013)Designs to account for trust in social network-based sybil defenses., , and . CCS, page 714-716. ACM, (2010)