Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recurring verification of interaction authenticity within bluetooth networks., , , , and . WISEC, page 192-203. ACM, (2021)BASTION-SGX: bluetooth and architectural support for trusted I/O on SGX., , , , and . HASP@ISCA, page 3:1-3:9. ACM, (2018)Trustworthy Wireless Personal Area Networks.. Dartmouth College, USA, (2019)Amulet: a secure architecture for mHealth applications for low-power wearable devices., , , , , , , , , and . MMA@SenSys, page 16-21. ACM, (2014)Amulet: An Energy-Efficient, Multi-Application Wearable Platform., , , , , , , , , and 3 other author(s). SenSys, page 216-229. ACM, (2016)CloseTalker: Secure, Short-Range Ad Hoc Wireless Communication., , , and . MobiSys, page 340-352. ACM, (2019)Proximity Detection with Single-Antenna IoT Devices., , , and . MobiCom, page 21:1-21:15. ACM, (2019)Poster: Proximity Detection with Single-Antenna IoT Devices., , , and . MobiCom, page 663-665. ACM, (2018)Challenges to ensuring human safety throughout the life-cycle of Smart Environments., and . SafeThings@SenSys, page 1-7. ACM, (2017)Improving PMUT Receive Sensitivity via DC Bias and Piezoelectric Composition., , , , , , and . Sensors, 22 (15): 5614 (2022)