Author of the publication

Sustainable medium access control: Implementation and evaluation of ODMAC.

, , and . ICC Workshops, page 407-412. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mind the tracker you wear: a security analysis of wearable health trackers., , and . SAC, page 131-136. ACM, (2016)ODMAC: an on-demand MAC protocol for energy harvesting - wireless sensor networks., and . PE-WASUN, page 49-56. ACM, (2011)Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study., , , and . HEALTHINF, page 383-388. SciTePress, (2017)Sustainable performance in energy harvesting: wireless sensor networks., , and . e-Energy, page 267-268. ACM, (2013)Why Hackers Love eHealth Applications., and . HealthyIoT, volume 187 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 58-63. (2016)Security and Privacy Issues in Health Monitoring Systems: eCare@Home Case Study., and . HealthyIoT, volume 187 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 165-170. (2016)MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities., , and . STM, volume 8203 of Lecture Notes in Computer Science, page 65-81. Springer, (2013)A Survey of Automatic Generation of Attack Trees and Attack Graphs., , , and . CoRR, (2023)Medium access control for thermal energy harvesting in advanced metering infrastructures., , , and . EUROCON, page 291-299. IEEE, (2013)Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot., , and . ARES, page 22:1-22:8. ACM, (2018)