From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis., , , и . CoRR, (2017)Reliable Group Communication Protocol for Internet of Things., , и . CoRR, (2019)ContextOS: A Context Aware Operating System for Mobile Devices., , и . GreenCom/iThings/CPScom, стр. 976-984. IEEE, (2013)Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN., , , и . SecureComm, том 19 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 265-284. Springer, (2009)CED2: Communication Efficient Disjointness Decision., , и . SecureComm, том 50 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 290-306. Springer, (2010)The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks., , , , и . WWIC, том 5546 из Lecture Notes in Computer Science, стр. 85-96. Springer, (2009)Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion).. Security Protocols Workshop, том 7622 из Lecture Notes in Computer Science, стр. 214-222. Springer, (2012)MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities., , и . STM, том 8203 из Lecture Notes in Computer Science, стр. 65-81. Springer, (2013)Time Warp: How Time Affects Privacy in LBSs., , , и . ICICS, том 6476 из Lecture Notes in Computer Science, стр. 325-339. Springer, (2010)Covert Channel-Based Transmitter Authentication in Controller Area Networks., , , , и . CoRR, (2019)