Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized MitM attacks on full TWINE., and . Inf. Process. Lett., 116 (2): 128-135 (2016)Capacity Analysis of Downlink NOMA-Based Coexistent HTC/MTC in UDN., , , and . ICCSPA, page 1-6. IEEE, (2019)Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1., , , , , , and . SmartGridComm, page 1-7. IEEE, (2019)AppVeto: mobile application self-defense through resource access veto., , , and . ACSAC, page 366-377. ACM, (2019)Physical Layer Security in Ultra-Dense Networks., , and . IEEE Wirel. Commun. Lett., 6 (5): 690-693 (2017)A new distinguishing and key recovery attack on NGG stream cipher., , and . Cryptogr. Commun., 1 (2): 269-282 (2009)Impossible Differential Properties of Reduced Round Streebog., , and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 274-286. Springer, (2015)A Heuristic for Finding Compatible Differential Paths with Application to HAS-160., , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 464-483. Springer, (2013)Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices., and . IEEE Access, (2016)Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks., , and . GLOBECOM, page 1-6. IEEE, (2018)