Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Enlargement Attacks Against UWB Distance Bounding Protocols., , , , , and . IEEE Trans. Inf. Forensics Secur., 11 (7): 1565-1577 (2016)ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN., , , , , and . Int. J. Inf. Sec., 20 (3): 269-285 (2021)Skype & Type: Keyboard Eavesdropping in Voice-over-IP., , , , and . ACM Trans. Priv. Secur., 22 (4): 24:1-24:34 (2019)On the Scalability of WebRTC with Information-Centric Networking., , , , , , and . LANMAN, page 1-6. IEEE, (2020)Validation of a Novel Wearable Multistream Data Acquisition and Analysis System for Ergonomic Studies., , , , , , , , , and 5 other author(s). Sensors, 21 (24): 8167 (2021)OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN., , and . ICN, page 166-175. ACM, (2016)ChoKIFA: A New Detection and Mitigation Approach Against Interest Flooding Attacks in NDN., , , , , and . WWIC, volume 11618 of Lecture Notes in Computer Science, page 53-65. Springer, (2019)IaaS-Aided Access Control for Information-Centric IoT., , , , and . LCN, page 208-216. IEEE, (2018)Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking., , , , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 243-262. Springer, (2015)Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP., , , and . AsiaCCS, page 703-715. ACM, (2017)