Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret Key Agreement by LLR Thresholding and Syndrome Feedback over AWGN Channel., , and . IEEE Communications Letters, 18 (1): 26-29 (2014)Low-power Secret-key Agreement over OFDM, , , , , , , and . CoRR, (2013)LQG-like control of scalar systems over communication channels: The role of data losses, delays and SNR limitations., , , and . Autom., 50 (12): 3155-3163 (2014)Worst-Case Spoofing Attack and Robust Countermeasure in Satellite Navigation Systems., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Power Allocation in Multiuser Parallel Gaussian Broadcast Channels With Common and Confidential Messages., , and . IEEE Trans. Commun., 64 (6): 2326-2339 (2016)A Reconfigurable Narrow-Band MB-OFDM UWB Receiver Architecture., , and . IEEE Trans. Circuits Syst. II Express Briefs, 55-II (4): 324-328 (2008)Resource allocation for secret transmissions on parallel Rayleigh channels., , and . ICC, page 2209-2214. IEEE, (2014)A game-theoretic analysis of energy-depleting jamming attacks., , , , and . ICNC, page 100-104. IEEE Computer Society, (2017)Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis., and . IEEE Trans. Inf. Forensics Secur., 9 (10): 1708-1719 (2014)Detection of GNSS Spoofing by a Receiver in Space via Fusion of Consistency Metrics., , , , , and . ICC, page 1-6. IEEE, (2020)